Read ProductGuide.book text version

Product Guide

McAfee Total Protection Service

The always on, always up-to-date, single solution for protecting your business

®

TM

COPYRIGHT

Copyright © 2008 McAfee, Inc. All Rights Reserved. No part of this publication may be reproduced, transmitted, transcribed, stored in a retrieval system, or translated into any language in any form or by any means without the written permission of McAfee, Inc., or its suppliers or affiliate companies.

TRADEMARK ATTRIBUTIONS

AVERT, EPO, EPOLICY ORCHESTRATOR, FLASHBOX, FOUNDSTONE, GROUPSHIELD, HERCULES, INTRUSHIELD, INTRUSION INTELLIGENCE, LINUXSHIELD, MANAGED MAIL PROTECTION, MAX (MCAFEE SECURITYALLIANCE EXCHANGE), MCAFEE, MCAFEE.COM, NETSHIELD, PORTALSHIELD, PREVENTSYS, PROTECTION-IN-DEPTH STRATEGY, PROTECTIONPILOT, SECURE MESSAGING SERVICE, SECURITYALLIANCE, SITEADVISOR, THREATSCAN, TOTAL PROTECTION, VIREX, VIRUSSCAN, WEBSHIELD are registered trademarks or trademarks of McAfee, Inc. and/or its affiliates in the US and/or other countries. McAfee Red in connection with security is distinctive of McAfee brand products. All other registered and unregistered trademarks herein are the sole property of their respective owners.

LICENSE INFORMATION License Agreement

NOTICE TO ALL USERS: CAREFULLY READ THE APPROPRIATE LEGAL AGREEMENT CORRESPONDING TO THE LICENSE YOU PURCHASED, WHICH SETS FORTH THE GENERAL TERMS AND CONDITIONS FOR THE USE OF THE LICENSED SOFTWARE. IF YOU DO NOT KNOW WHICH TYPE OF LICENSE YOU HAVE ACQUIRED, PLEASE CONSULT THE SALES AND OTHER RELATED LICENSE GRANT OR PURCHASE ORDER DOCUMENTS THAT ACCOMPANIES YOUR SOFTWARE PACKAGING OR THAT YOU HAVE RECEIVED SEPARATELY AS PART OF THE PURCHASE (AS A BOOKLET, A FILE ON THE PRODUCT CD, OR A FILE AVAILABLE ON THE WEB SITE FROM WHICH YOU DOWNLOADED THE SOFTWARE PACKAGE). IF YOU DO NOT AGREE TO ALL OF THE TERMS SET FORTH IN THE AGREEMENT, DO NOT INSTALL THE SOFTWARE. IF APPLICABLE, YOU MAY RETURN THE PRODUCT TO MCAFEE OR THE PLACE OF PURCHASE FOR A FULL REFUND.

License Attributions

Refer to the product Release Notes.

Issued March 2008 / Total Protection Service

TM

Contents

1

Introduction

9

What is Total Protection Service? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .10 Select the right version of Total Protection Service . . . . . . . . . . . . . . . . . . . . .11 Protect against many kinds of threats . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .11 Ensure continuous, automatic protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . .12 What is new in this release? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .13 How does the software work? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 The updating process . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .14 Retrieving updates . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .15 Uploading security information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Outbreak response . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Rumor technology . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .16 Internet Independent Updating (IIU) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .17 Managing with the online SecurityCenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .18 User groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 20 Customized policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 21 Using this guide . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Who should read this guide? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 22 Conventions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 23 Getting product information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 24 Contact information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 25

2

Installing Total Protection Service

After you place your order . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . System requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Operating systems . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Operating system support ending . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . RAM . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Email security service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Email server security application . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . McAfee GroupShield for Microsoft Exchange Server. . . . . . . . . . . . . . . . McAfee GroupShield for Lotus Domino, Windows edition . . . . . . . . . . . Terminal servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Before you install . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstall existing virus protection software . . . . . . . . . . . . . . . . . . . . . . . . . . Uninstall existing firewall software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Configure your browser . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Internet Explorer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Non-Microsoft browsers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Install the standalone installation agent . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing Total Protection Service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Standard URL installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Requirements . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Sending an installation URL to users . . . . . . . . . . . . . . . . . . . . . . . . . . . Installing on client computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Advanced installation methods. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Silent installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Push installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . If you use a corporate firewall or proxy server . . . . . . . . . . . . . . . . . . . . . . . .

27

28 29 29 29 31 31 31 31 32 32 33 33 35 35 35 35 36 37 37 37 38 38 40 41 44 47

3

Total Protection Service Product Guide

Contents

Enabling relay servers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using the Push Install utility . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using VSSETUP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Using pre-installed and CD versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Setting up a pre-installed copy of Total Protection Service . . . . . . . . . . . . . . When you first turn on the computer . . . . . . . . . . . . . . . . . . . . . . . . . . . Activating the copy of Total Protection Service . . . . . . . . . . . . . . . . . . . . Purchasing or renewing a full subscription . . . . . . . . . . . . . . . . . . . . . . . Viewing or creating an account enrollment key . . . . . . . . . . . . . . . . . . . . . . . Activating your license key . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Completing the installation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Test virus protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scan the client computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Scan the email Inbox . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Set up the default firewall . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . What should I do after installing? . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .

48 48 48 49 49 50 50 51 51 51 52 52 52 53 53 54

3

Using Total Protection Service

55

Using the client software . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Total Protection Service system tray icon . . . . . . . . . . . . . . . . . . . . . . . . . . . 56 Removing and displaying the icon . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Client menu . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 57 Administrative menu and tasks . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Updating client computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Update automatically . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 58 Update manually . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Update during an outbreak . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 59 Update computers where no user is logged on . . . . . . . . . . . . . . . . . . . . . . 60 Using the SecurityCenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 60 Getting started . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Log on to the SecurityCenter . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Access online features and functions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 62 Make the most of your online data. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 64 Customize listings and reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Using the online help . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 65 Setting up your account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Set up your profile . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Select the language for your account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 66 Change your SecurityCenter password . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Sign up for email notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Viewing your security services at-a-glance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 67 Install protection services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 68 View and resolve action items . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 View security coverage for your account . . . . . . . . . . . . . . . . . . . . . . . . . . . . 69 Managing your computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 70 Search for computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Install protection services. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 71 Display groups or individual computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 Display details for a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 72 View detections for a computer . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74 View and manage user-approved applications for a computer . . . . . . . . . . . . . 74 Send email to computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Block computers from receiving updates . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Delete computers from your reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 75 Move computers into a group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 Creating groups to manage your site . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .76 The Default Group . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Create, view, and manage groups . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 77 Designating group administrators . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 78 Create or edit a group administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80 Delete a group administrator . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 80

4

Total Protection Service Product Guide

Contents

Setting up policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . The McAfee Default policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Create or edit a policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Assign a policy to a group. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Restore default policy settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Delete a policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Viewing reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View duplicate computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View computer profiles . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing your correspondence . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Send email to users . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update user email addresses . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update your account's email address . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Add your logo to reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Managing your subscriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View your service subscriptions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Update subscription information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Purchase, add, and renew services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Request a trial subscription . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Receive subscription notifications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Merge another account into your account . . . . . . . . . . . . . . . . . . . . . . . . . . . Getting assistance . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View printed and online documents . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Download utilities . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Contact product support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . View demos and tutorials . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . Recommendation for managing large accounts . . . . . . . . . . . . . . . . . . . . . . . . . .

81 82 83 83 84 84 85 86 87 88 88 88 88 89 89 90 90 91 91 91 92 92 92 93 93 94 94

4

Using the Virus and Spyware Protection Service

95

Accessing client features (Scan Tasks menu) . . . . . . . . . . . . . . . . . . . . . . . . . . . 95 Scanning client computers . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Scan automatically (on-access scans) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 97 Scan manually (on-demand scans) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 98 View scan results . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 99 How detections are handled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Schedule on-demand scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Scan email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .100 Scan for spyware . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 101 Configuring policies for virus and spyware protection . . . . . . . . . . . . . . . . . . . . .103 Set basic virus protection options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .103 Schedule on-demand scans . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .104 Exclude files and folders from virus scans . . . . . . . . . . . . . . . . . . . . . . .104 Set advanced virus protection options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105 Select your update frequency . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .105 Enable optional protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .106 Set basic spyware protection options . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107 Enable spyware protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .107 Select a spyware protection mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . .108 Specify approved programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .109 Set advanced spyware protection options . . . . . . . . . . . . . . . . . . . . . . . . . . . 110 Viewing reports for virus and spyware detections . . . . . . . . . . . . . . . . . . . . . . . . 111 View detections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 111 View unrecognized programs . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 113 View your detection history . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 115 Managing detections . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 116 Manage your protection strategy with best practices . . . . . . . . . . . . . . . . . . 116 Manage quarantined files . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 117 Disabling on-access scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 118

5

Using the Firewall Protection Service

119

Accessing client features (Firewall Settings command) . . . . . . . . . . . . . . . . . . . . 119

5

Total Protection Service Product Guide

Contents

Configuring policies for firewall protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .120 Specify who configures firewall protection settings . . . . . . . . . . . . . . . . . . .121 Install the firewall protection service via policy . . . . . . . . . . . . . . . . . . . . . . .122 Enable firewall protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .122 Select a firewall protection mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .123 Learn mode . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 Specify a connection type . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .124 Configure a custom connection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .125 Configure system services for a custom connection . . . . . . . . . . . . . . .125 Configure IP addresses for a custom connection . . . . . . . . . . . . . . . . . .128 Enable tracking of blocked events . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129 Set up allowed Internet applications . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .129 Specify Internet applications in a policy . . . . . . . . . . . . . . . . . . . . . . . . . .130 Specify whether to use McAfee recommendations . . . . . . . . . . . . . . . .131 Viewing reports for firewall protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .131 View unrecognized Internet applications . . . . . . . . . . . . . . . . . . . . . . . . . . . .132 View inbound events blocked by the firewall . . . . . . . . . . . . . . . . . . . . . . . . .133 Managing suspicious activity with best practices . . . . . . . . . . . . . . . . . . . . . . . .134

6

Using the Browser Protection Service

137

Accessing site safety information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .137 How safety ratings are compiled . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 Staying safe during searches . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .138 Staying safe while browsing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .139 Viewing safety reports . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 Configuring browser protection settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 Configuring browser protection from the SecurityCenter . . . . . . . . . . . . . . .140 Installing via policy . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .140 Configuring browser protection on the client computer. . . . . . . . . . . . . . . . .141 Submitting feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .142

7

Using the Email Security Service

143

Activating the email security service . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144 Using the portal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .144 Setting up your account . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Update your MX records . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Customize your account settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .145 Default settings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 Recommended first steps . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .146 Optional customization. . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .147 Configure general administration settings . . . . . . . . . . . . . . . . . . . . . . . . . . .148 Viewing your email protection status . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .150 Configuring a policy for email security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .151 Viewing reports for the email security service . . . . . . . . . . . . . . . . . . . . . . . . . . .151 Managing quarantined email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152 View and manage quarantined user messages . . . . . . . . . . . . . . . . . . . . . . .152 Check the Quarantine Summary . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .152 View quarantined mail deliveries . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153 Getting more information . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .153

8

Troubleshooting

155

Uninstalling protection services . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .155 Frequently asked questions (FAQ) . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 Installing . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .156 Using pre-installed or CD versions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157 Adding, renewing, and moving licenses . . . . . . . . . . . . . . . . . . . . . . . . . . . . .157 Configuring and managing policies . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .158 Scanning . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .159 Reporting . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .160 Updating . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161 Firewall protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .161

6

Total Protection Service Product Guide

Contents

Browser protection . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162 Email . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .162 General . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .163 Error messages . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .165 Contacting product support . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . .170

Glossary Index

171 177

7

Total Protection Service Product Guide

Contents

8

1

Introduction

McAfee Total Protection Service safeguards your computers automatically, and its advanced features let you customize your business's security strategy. This section provides an overview of the product, its features, and how to use product resources for additional assistance. What is Total Protection Service? What is new in this release? How does the software work? Managing with the online SecurityCenter Using this guide Getting product information

®

TM

9

Total Protection Service Product Guide

Introduction

What is Total Protection Service?

1

What is Total Protection Service?

Total Protection Service delivers comprehensive security as a service for all the computers on your account. These services automatically check for threats, intercept them, take the appropriate action to keep your data and your network safe, and track detections and security status for reports.

Figure 1-1 Total Protection Service overview

1

The Total Protection Service client software runs on each computer where it is installed. The client software updates itself -- automatically and silently -- by downloading the latest detection definition (DAT) files from your account's administrative website, the McAfee SecurityCenter. The client software uploads security information about each computer to the SecurityCenter for use in administrative reports. As your account's administrator, you can use a web browser to visit the SecurityCenter, where you can access reports that detail the status of client computers and use tools for customizing and managing security.

2

3

4

10

Total Protection Service Product Guide

Introduction

What is Total Protection Service?

1

Select the right version of Total Protection Service

Select the version that best supports your needs.

Total Protection Basic Virus and spyware protection for desktop computers and servers. Firewall protection for desktop computers and servers. Browser protection for desktop computers. Access to the McAfee SecurityCenter for centralized management of your accounts.

TM

Service Advanced

Virus and spyware protection for desktop computers and servers. Firewall protection for desktop computers and servers. Browser protection for desktop computers. Access to the McAfee SecurityCenter for centralized management of your accounts. Email security: Email security service to protect all inbound email against virus, spam, and phishing attacks, or Email server security application for additional virus protection and spam filtering at the server level.

This guide focuses on Total Protection Service protection for desktop computers and servers, and also contains instructions for setting up the email security service available in Total Protection Service -- Advanced. Refer to your product CD or the McAfee download center for information about using the email server security application.

Protect against many kinds of threats

Total Protection Service protects against a broad range of threats: Virus and spyware protection checks for viruses, spyware, unwanted programs, and other potential threats borne on removable media or brought in from your network, including via email. Every time a file on your computer is accessed, virus and spyware protection scans the file to make sure it is free of viruses and spyware. Firewall protection establishes a barrier between each computer and the Internet or other computers on your local network. It silently monitors communications traffic for suspicious activity and takes appropriate action, such as blocking. Browser protection displays information to safeguard client computer users against web-based threats. Users can view website safety ratings and safety reports as they browse or search with Microsoft Internet Explorer or Mozilla Firefox. Email security protects against email threats by scanning messages before they are received. It blocks or quarantines detections of directory harvest attacks, spam, phishing scams, viruses, and other email-borne threats in messages and attachments, to prevent them from reaching client computers. Email security is available with Total Protection Service -- Advanced. The email server security application, McAfee GroupShield provides comprehensive virus and spam protection for the email and other content entering and leaving your environment. Proactive anti-virus scanning and an automatic outbreak manager prevent malicious code from disrupting the system, while advanced content filtering allows administrators to set up rules for inappropriate content, sensitive information, and adding disclaimers to messages.

®

11

Total Protection Service Product Guide

Introduction

What is Total Protection Service?

1

McAfee GroupShield for Microsoft Exchange protects your Microsoft Exchange ® Server 2000/2003/2007 environment and includes McAfee SpamKiller for Mail Servers. McAfee GroupShield for Lotus Domino protects your Lotus Domino Windows edition version 6.0.2/7.0.2/8.0 environment and includes McAfee Anti-Spam for GroupShield. The email server security application is available with Total Protection Service -- Advanced. Detailed documentation on this application is available on the CD or in the downloadable installer accessible from the McAfee download center.

Ensure continuous, automatic protection

Total Protection Service safeguards your computers with: Continuous protection -- From the time a client computer is turned on until it is turned off, Total Protection Service silently monitors all file input and output, downloads, program executions, inbound and outbound communications, and other system-related activities. Instant discovery -- When Total Protection Service detects a virus threat, it attempts to clean the item containing the threat before further damage can occur. If an item cannot be cleaned, a copy of it is placed in a quarantine folder and the original item is deleted. Customized threat response -- By default, Total Protection Service provides a high degree of protection against threats. You can also configure the response to detections of potentially unwanted programs and suspicious activity to suit the needs of your business: take immediate action to clean, quarantine, or block the detection; prompt users for a response; or only log the detection for administrative reports. Automatic updates -- Total Protection Service checks for product updates at regular intervals throughout the day, comparing security components against the latest releases. When a computer needs a newer version, the client software automatically retrieves it. Avert Early Warning system and outbreak response -- Total Protection Service uses the latest information about threats and outbreaks as soon as they are discovered by McAfee Avert Labs, a research division of McAfee. Whenever Avert Labs releases an outbreak detection definition (DAT) file, your network receives it promptly.

12

Total Protection Service Product Guide

Introduction

What is new in this release?

1

What is new in this release?

New feature New data in the main SecurityCenter page Description Adds list of top detections. Adds list of computers with highest number of detections. Reorganizes content for greater accessibility. Easier management for large accounts New layout for Groups + Policies tab Streamlined approval of applications for firewall and spyware policies Adds a new filter for displaying group views in reports and computer listings, which improves efficiency in managing large numbers of computers. Displays groups and policies separately. Adds drill-down capability for managing the policy assigned to each group. Adds links to the Spyware Protection policy tab for excluding programs from spyware scans. Adds links to the Desktop Firewall policy tab for approving or blocking applications. Adds links to the Unrecognized Programs report for approving or blocking applications. Allows programs to be approved for up to 10 policies at a time. Improved cookie handling Adds cookies to the types of programs appearing in the Detections and Unrecognized Programs reports. Adds cookies to the types of applications displayed in the User-Approved Applications list. Ability to turn off tracking of blocked events Spam filtering in email security applications Greater operating system support Adds a policy option for tracking events listed in the Inbound

Events Blocked by Firewall report.

Adds spam protection to the email security options included with Total Protection Service -- Advanced. Provides protection services for computers running Windows Server 2008.

13

Total Protection Service Product Guide

Introduction

How does the software work?

1

How does the software work?

Total Protection Service implements a three-prong approach to security by: 1 Silently monitoring all file input and output, downloads, program executions, inbound and outbound communications, and other system-related activities on client computers. Detected viruses are deleted or quarantined automatically. Potentially unwanted programs, such as spyware or adware, are removed automatically unless you select a different response. Suspicious activity is blocked unless you specify a different response. 2 Regularly updating detection definition (DAT) files and software components to ensure that you are always protected against the latest threats. 3 Uploading security information for each client computer to the SecurityCenter, then using this information to send emails and create reports that keep you informed about your account's status. In addition, it provides tools for managing client computers and customizing your security strategy.

The updating process

Regular updates are the cornerstone of Total Protection Service. Updates of its security components running on client computers. See Retrieving updates. Updates to the security data maintained on the SecurityCenter website and used in administrative reports. See Uploading security information. Updates can occur in three ways, enabling you to use network resources efficiently.

14

Total Protection Service Product Guide

Introduction

How does the software work?

1

Figure 1-2 Methods for updating client computers

In a simple scenario, each client computer on your account has a direct connection to the Internet and checks for new updates. Rumor technology enables all computers in a workgroup to share downloaded files, which controls Internet traffic and minimizes expensive downloads. Internet Independent Updating (IIU) enables any computer on the network to get information from the update site, even if that computer does not have an Internet connection, as long as at least one computer on the network is configured as a relay server.

Retrieving updates

Five minutes after a client computer starts, and at regular intervals throughout the day, the Total Protection Service client software checks if updates are available. If they are, the client computer pulls them from another computer on the network (via Rumor technology) or downloads them directly from the Internet site. The detection definition (DAT) files on the Internet site are regularly updated to add protection against new threats. When the client software connects to the update site on the Internet, it retrieves:

15

Total Protection Service Product Guide

Introduction

How does the software work?

1

Regular DAT files, which contain the latest definitions for viruses, potentially unwanted programs, and cookies and registry keys that might indicate spyware. Outbreak DAT files, which are high-priority detection definition files released in an emergency situation (see Outbreak response). Upgrades to the software if a newer version exists. Policy updates. At any time, users can update manually by double-clicking in the system tray.

Note

Update support for some operating systems is ending. After support ends, client computers running those operating systems will no longer be protected against new threats. See Operating system support ending on page 29 for more information.

Uploading security information

Client computers upload detection and status data hourly to the SecurityCenter website. This information is available to administrators in reports they can view on the SecurityCenter (see Viewing reports on page 85).

Outbreak response

When an outbreak of a new threat is identified by Avert Labs, they issue an outbreak DAT, which is a special detection definition (DAT) file marked as Medium or High importance. It is specially encoded to inform the first computer receiving it to share the update immediately with other client computers on the network. By default, client computers check for an outbreak DAT every hour.

Rumor technology

When one computer shares updates with other computers on the local area network (LAN), rather than requiring each computer to retrieve updates from the update website individually, the Internet traffic load on the network is reduced. This process of sharing updates is called Rumor. 1 Each client computer checks the version of the most recent catalog file on the Internet site. This catalog file contains information for every component in Total Protection Service, and is stored in a digitally signed, compressed .CAB file format. If the version is the same as the catalog file on the client computer, the process stops here. If the version is different from the catalog file on the client computer, the client computer attempts to retrieve the latest catalog file from its peers. It queries if other computers on the LAN have already downloaded the new catalog file. 2 The client computer retrieves the required catalog file (directly from the Internet site or from one of its peers) and uses it to determine if new components are available for Total Protection Service. 3 If new components are available, the client computer attempts to retrieve them from its peers. It queries if computers on the LAN have already downloaded the new components.

16

Total Protection Service Product Guide

Introduction

How does the software work?

1

If so, the client computer retrieves the update from a peer. (Digital signatures are checked to verify that the computer is valid.) If not, the client computer retrieves the update directly from the update site. 4 On the client computer, the catalog file is extracted and new components are installed.

Internet Independent Updating (IIU)

Internet Independent Updating enables computers to use Total Protection Service when they are not connected to the Internet. At least one computer on the subnet must have an Internet connection to be able to communicate with the udpate site. That computer is configured as a relay server, and computers without an Internet connection retrieve updates locally from the relay server. 1 When a computer without Internet access fails to connect directly to the update site, it requests information from the relay server. 2 The relay server downloads a catalog of updates from the update site. 3 The computer with no Internet connection downloads the necessary updates from the relay server. For more information, see Enabling relay servers on page 48.

17

Total Protection Service Product Guide

Introduction

Managing with the online SecurityCenter

1

Managing with the online SecurityCenter

To manage your account via the SecurityCenter, use the URL you received in an email message from your service provider. From the SecurityCenter, you can view the status of your protection services, access reports on client activity such as detections and suspicious activity, update your account data, and configure security settings. You can manage client computers by customizing how often they check for updates, changing the way they handle detections, and scheduling regular scans.

Figure 1-3 The online SecurityCenter

18

Total Protection Service Product Guide

Introduction

Managing with the online SecurityCenter

1

The SecurityCenter's main page shows a status summary for all the protection services you have purchased (except email server protection):

Security Status -- Indicates whether any action is required to address security issues,

and links you to instructions for resolving them.

Product Coverage Summary -- Illustrates the current status for each protection service. Virus and Spyware Coverage -- Illustrates the number of computers that are

up-to-date and out-of-date, and where the virus and spyware protection service is not installed. Click a color in the pie chart to display a list of computers in that category.

Firewall Coverage -- Illustrates the number of computers where the firewall

protection service is and is not installed. Click a color in the pie chart to display a list of computers in that category.

Browser Protection Coverage -- Illustrates the number of computers where the browser protection service is and is not installed. Click a color in the pie chart to display a list of computers in that category. Product Activity Summary -- Provides an overview of security threats. Detection History -- Charts the number of threats detected over the last month. Top Computers with Detections -- Lists the computers where the greatest number

of detections occurred.

Subscription Summary -- Shows subscription and licensing information for each

protection service. Click a button to install protection services, renew a subscription, or buy additional licenses.

Email Activity for the Last 7 Days -- Illustrates the percentage of messages delivered by category (clean, spam, virus detected). Click a color in the pie chart or select Click here to configure to open the email security service's web portal and view reports

about your email. See Using the SecurityCenter on page 60 for more information. The SecurityCenter offers two powerful tools for displaying your computers in groups and fine-tuning their security settings. User groups enable you to effectively categorize and manage client computers that require different security settings or special monitoring. Customized policies allow you to specify security settings to meet the needs of your users and effectively use your network resources.

19

Total Protection Service Product Guide

Introduction

Managing with the online SecurityCenter

1

User groups

Each computer running the client software belongs to a group. A group consists of one or more computers using the same security settings (called policies). By default, computers are placed in the Default Group. In large accounts, groups are an essential tool for managing computers efficiently. Groups also help you manage different types of computers effectively. You can base groups on geographic location, department, computer type, user tasks, or anything meaningful to your organization. For example, you might place all laptops used by traveling sales representatives into a single group called Sales Team. You can then view details about this group of computers separately from other computers in your account. You can easily check detections for these computers or customize their security settings in a policy (see Customized policies on page 21) that accounts for specific circumstances and risks of a remote user. To create groups, use the Groups + Policies tab on the SecurityCenter website. See Creating groups to manage your site on page 76 for more information. The following example shows how an administrator might configure policies for three different groups of client computer users in an organization. You should configure policies for your users to meet your own company's needs.

Policy Setting

On-Demand Scan Enable outbreak response Scan within archives during on-access scans Check for updates every Spyware Protection Mode Approved Programs Firewall Protection Mode Use Smart Recommendations to automatically approve common Internet applications Connection Type Allowed Internet Applications

Weekly Enabled No 12 hours Prompt None Protect Enabled

Daily Enabled Enabled 4 hours Protect None Protect No

Daily Enabled Enabled 4 hours Prompt Nmap remote admin tool Prompt Enabled

Trusted network AOL Instant Messenger

Untrusted network None

Trusted network AOL Instant Messenger GoogleTalk

20

Total Protection Service Product Guide

Introduction

Managing with the online SecurityCenter

1

Customized policies

After installation, Total Protection Service protects client computers from threats immediately using default security settings. However, you might want to change the way some features are implemented for some or all of your computers. For example, you might want the service to check for updates every four hours or set up a list of programs you consider safe. Policies are made up of security settings that define how protection services operate on client computers. Policy management allows you to assign different levels and types of protection to different users. If you have created groups, you can assign a unique policy to each group or one policy to all groups. For example, you can assign a Sales policy to your mobile Sales Team group, with security settings that protect against threats in unsecure networks such as airports and hotels.

Figure 1-4 Example: Sales Team group and Sales policy

21

Total Protection Service Product Guide

Introduction

Using this guide

1

1

Create a Sales Team group and a Sales policy. Assign the Sales policy to the Sales Team group.

2

3

Client software running on computers in the Sales Team group performs the tasks defined in the Sales policy: Check for updates to software components and DAT files every 4 hours. Check for outbreak DAT file every hour. Scan for viruses and potentially unwanted programs daily. Block communication from computers on local network (untrusted network).

4

Client software sends security data for each client computer to the SecurityCenter.

5

Administrator checks the security status for the Sales Team group in reports on the SecurityCenter. The administrator adjusts the Sales policy. The modified policy is downloaded automatically to client computers in the Sales Team group the next time they check for updates.

6

To create your own policies and assign them to computers or groups, use the Groups + Policies tab on the SecurityCenter website. See Setting up policies on page 81 for more information.

Using this guide

This guide provides information on installing, configuring, using, and troubleshooting Total Protection Service.

Who should read this guide?

This information is designed for: System and network administrators who want to implement a proactive, hands-on approach to their security strategy. Partner Security Services (PSS) partners who remotely manage and monitor the SecurityCenter on behalf of their customer base. Hands-off administrators who do not need to customize security settings can read an overview of basic features in the Quick Start Guide, which is available from the Help page on the SecurityCenter website.

22

Total Protection Service Product Guide

Introduction

Using this guide

1

Conventions

This guide uses the following conventions:

Bold Condensed

All words from the user interface, including options, menus, buttons, and dialog box names. Example: Type the User name and Password of the desired account. Courier The path of a folder or program; text that represents something the user types exactly (for example, a command at the system prompt). Example: The default location for the program is: C:\Program Files\McAfee\EPO\3.5.0 Run this command on the client computer: C:\SETUP.EXE Italic For emphasis or when introducing a new term; for names of product documentation and topics (headings) within the material. Example: Refer to the VirusScan Enterprise Product Guide for more information. Blue A web address (URL) and/or a live link. Visit the McAfee website at: http://www.mcafee.com <TERM> Angle brackets enclose a generic term. Example: In the console tree, right-click <SERVER>. Note: Supplemental information; for example, an alternate method of executing the same command. Tip: Suggestions for best practices and recommendations from McAfee for threat prevention, performance, and efficiency. Caution: Important advice to protect your computer system, enterprise, software installation, or data. Warning: Important advice to protect a user from bodily harm when interacting with a hardware product.

Note

Tip

Caution

Warning

23

Total Protection Service Product Guide

Introduction

Getting product information

1

Getting product information

Several types of information are available to meet the specific needs of client computer users and administrators.

Users -- Client computer users can access online help from links in the client software. Online User Help Access online instructions for performing security tasks in two ways: Click help on any window displayed by the client software. Click in the system tray and select Help.

Note: If the product's built-in help system displays incorrectly on a

client computer, its version of Microsoft Internet Explorer might not be using ActiveX controls properly. These controls are required to display the help file. Make sure the latest version of Internet Explorer is installed with its Internet security settings set to Medium or

Medium-high.

Online Installation Instructions Click the help link on any installation dialog box to display instructions for installing Total Protection Service using the URL method. Also contains instructions for preparing for installation, testing, uninstalling, and troubleshooting installation issues.

Administrators -- Unless otherwise noted, these product documents are Adobe Acrobat .PDF files available on the Help page of the SecurityCenter. Product Guide Product introduction and features, detailed instructions for configuring the software, information on deployment, recurring tasks, and operating procedures. Recommended for administrators who manage large organizations or multiple accounts, and for hands-on administrators who want to customize security settings and actively monitor client computers. A short "getting started" with information on basic product features, routine tasks that you perform often, and critical tasks that you perform occasionally. Recommended for first-time customers who need an overview of the product, and for hands-off administrators who plan to use the default security settings and monitor security status through their weekly status email. ReadMe. Product information, resolved issues, known issues, and last-minute additions or changes to the product or its documentation. Available as a text document. For information about any page of your SecurityCenter website, click the help ( ? ) link in the upper-right corner. You can access additional information with the table of contents, index, or search feature. While running the Push Install utility, click the help link on any dialog box for information about deploying client software remotely to one or more computers without user intervention. After an update, click Avert Labs Threat Library on the Total Protection Service window to access the online McAfee Threat Library. This website has detailed information on where threats come from, how they infect your system, and how to remove them. The Avert Labs Threat Library contains useful information on hoaxes, such as virus warnings that you receive via email. A Virtual Card For You and SULFNBK are two of the best-known hoaxes, but there are many others. Next time you receive a well-meaning warning, view our hoax page before you pass the message on to your friends. Demos and tutorials Audio-based, multimedia files that provide basic information about Total Protection Service, the installation process , and the SecurityCenter. Available from the Help page or the login window.

Quick Start Guide

Release Notes

Online SecurityCenter help Online Push Install help Avert Labs Threat Library

24

Total Protection Service Product Guide

Introduction

Getting product information

1

Total Protection Service -- Advanced -- These additional documents are available. Email security service See Chapter 7, Using the Email Security Service for instructions on setting up and using basic features of the email security service. Links are available from the SecurityCenter website to the email security service's web portal, where you can configure the service, access its administration guide, and view reports. Detailed documentation for the email server security application is available on the product CD or in the downloadable installer accessible from the McAfee download center.

Email server security application

Contact information

Threat Center: McAfee Avert Labs

http://www.mcafee.com/us/threat_center/default.asp Avert Labs Threat Library http://vil.nai.com

®

Avert Labs WebImmune & Submit a Sample (Logon credentials required) https://www.webimmune.net/default.asp Avert Labs DAT Notification Service http://vil.nai.com/vil/signup_DAT_notification.aspx

Download Site http://www.mcafee.com/us/downloads/

Product Upgrades (Valid grant number required) Security Updates (DATs, engine) HotFix and Patch Releases For Security Vulnerabilities (Available to the public) For Products (ServicePortal account and valid grant number required) Product Evaluation McAfee Beta Program

Technical Support

http://www.mcafee.com/us/support/ KnowledgeBase Search http://knowledge.mcafee.com/

McAfee Technical Support ServicePortal (Logon credentials required) https://mysupport.mcafee.com/eservice_enu/start.swe

Customer Service

Web http://www.mcafee.com/us/support/index.html http://www.mcafee.com/us/about/contact/index.html Phone -- US, Canada, and Latin America toll-free: +1-888-VIRUS NO or +1-888-847-8766 Monday ­ Friday, 8 a.m. ­ 8 p.m., Central Time

Professional Services

Small and Medium Business: http://www.mcafee.com/us/smb/services/index.html

Total Protection

Beta Site http://betavscan.mcafeeasap.com Beta Feedback [email protected]

25

Total Protection Service Product Guide

Introduction

Getting product information

1

26

2

Installing Total Protection Service

This section describes what happens after you purchase the hosted services in Total Protection Service and Total Protection Service -- Advanced, provides system requirements, and explains how to install virus and spyware protection, firewall protection, and browser protection.

If you purchased Total Protection Service -- Advanced, refer to emails and materials from McAfee for instructions on installing the email security service or email server security application. See Chapter 7, Using the Email Security Service for information about activating and setting up the email security service.

Note

After you place your order System requirements Before you install Installing Total Protection Service Using pre-installed and CD versions Completing the installation What should I do after installing?

27

Total Protection Service Product Guide

Installing Total Protection Service

After you place your order

2

After you place your order

When you place an order for Total Protection Service, you supply an email address, and your account is associated with that email address. After you submit your order: 1 McAfee processes your order. 2 You receive three emails:

This email... Welcome Contains... The download URL and instructions for installing the protection services, accessing documentation, and contacting customer support. Instructions for logging on to the McAfee SecurityCenter administrative website and changing your password. The grant number for the order, which is required for customer support.

Login credentials

Grant letter

3 If you purchased Total Protection Service -- Advanced, you also receive an email with instructions for changing your MX (Mail eXchange) records. See Update your MX records on page 145.

If you purchased Total Protection Service from a McAfee partner who manages security for you, the partner usually receives these emails. If you have questions about which emails you should receive, contact the partner.

Note

Placing multiple orders If you placed more than one order using different email addresses, you have more than one Total Protection Service account. To merge them so that all your security information and emails are sent to a single email address, see Merge another account into your account on page 92.

28

Total Protection Service Product Guide

Installing Total Protection Service

System requirements

2

System requirements

Total Protection Service is designed for Microsoft Windows operating systems running on a PC platform. It installs and runs on computers equipped with: An Intel Pentium processor or compatible architecture. Microsoft Internet Explorer 5.5 SP2 or later.

Operating systems

Protection services Operating system Client computers Windows 2000 Professional with Service Pack 3 or later Windows XP Home Windows XP Professional (32-bit) Windows Vista (32-bit) Windows XP Windows Vista (64-bit) Servers Windows 2000 Server Advanced Server Small Business Server with Service Pack 3 or later Windows 2003 Standard Server Enterprise Server Web Edition Small Business Server Windows Server 2008 (32-bit and 64-bit) Standard Server Enterprise Server Small Business Server Virus and spyware Firewall Browser

X X X X

X X X

X X X

X X X

X X X

Caution

If you upgrade the operating system on a client computer (for example, from Windows 2000 to Windows XP) and you want to leave your existing files and programs intact during the upgrade, you must first uninstall Total Protection Service, then reinstall it after the upgrade is complete.

Caution

Support for some operating systems is ending. After support ends, client computers running those operating systems will no longer be protected against new threats. See Operating system support ending for more information.

Operating system support ending

Support for these Windows operating systems ended with Total Protection Service version 4.5.

29

Total Protection Service Product Guide

Installing Total Protection Service

System requirements

2

Windows 95 Windows 98 Windows ME Windows NT 4.x For more information about support for these operating systems, visit http://www.mcafee.com/us/enterprise/support/customer_service/end_life.html, then look for Total Protection Service under Managed Services Matrix. See Notifying users when support ends for information about notifying users when support for their operating system is ending.

Notifying users when support ends

By default, Total Protection Service displays notifications on client computers to remind users that support is ending for their operating system. When upgrades to product components, such as the scanning engine, are scheduled to end or will end within 30 days. When updates to detection definition (DAT) files have ended or will end within 30 days. A policy option determines whether support notifications are displayed.

Notifications are not displayed for computers running versions of Windows for which support has already ended.

Note

To enable or disable notifications: 1 On the Groups + Policies page, click Add Policy (or click Edit to modify an existing policy). 2 Click the Advanced Settings tab. 3 Select or deselect Display support notifications on client computers, then click Save.

30

Total Protection Service Product Guide

Installing Total Protection Service

System requirements

2

RAM

Minimum virus and spyware protection Windows 2000 Windows XP Windows 2003 Windows Vista Windows Server 2008 Other Servers 64 MB 128 MB 256 MB 512 MB 512 MB 256 MB Minimum firewall protection* 256 MB 256 MB 512 MB 512 MB 512 MB 512 MB Recommended

256 MB 256 MB 512 MB 1 GB 2 GB 512 MB

* Use the value listed for the firewall protection service whether installing that service alone or with other protection services.

Email security service

Total Protection Service -- Advanced includes the additional email security service. To set up and run this service, you need: A dedicated email server, either in-house or hosted by an ISP. A company email domain, such as yourdomain.com, with a static IP address.

Email server security application

Total Protection Service -- Advanced gives you the option to install the McAfee GroupShield email server security application. McAfee GroupShield for Microsoft Exchange Server McAfee GroupShield for Lotus Domino, Windows edition

McAfee GroupShield for Microsoft Exchange Server

Minimum requirements for Microsoft Exchange Server 2007: x64 architecture-based processor with EM64T or AMD64 support. 2 GB of RAM. 740 MB free disk space. Microsoft Exchange 2007. One of these operating systems: Microsoft Windows 2003 Server with Service Pack 1 (64-bit). Microsoft Windows 2003 R2, Standard or Enterprise Edition (64-bit). Internet Explorer 6.0 or later. Minimum requirements for Microsoft Exchange Server 2003: Intel Pentium or compatible 133MHz processor. 256 MB of RAM (512 MB recommended).

31

Total Protection Service Product Guide

Installing Total Protection Service

System requirements

2

740 MB free disk space. Microsoft Exchange 2003 with Service Pack 1 or later. One of these operating systems: Microsoft Windows 2000 Server with Service Pack 4. Microsoft Windows 2000 Advanced Server with Service Pack 4. Microsoft Windows Server 2003 Standard Edition (32-bit). Microsoft Windows Server 2003 Enterprise Edition (32-bit). Internet Explorer 5.5 or later. Minimum requirements for Microsoft Exchange Server 2000 with Service Pack 3: Intel Pentium or compatible 133MHz processor. 128 MB of RAM (256 MB recommended). 740 MB of free disk space. Microsoft Exchange 2000 with Service Pack 3. Microsoft Windows 2000 Server with Service Pack 4. Internet Explorer 5.5 or later.

McAfee GroupShield for Lotus Domino, Windows edition

Intel Pentium or compatible 133MHz processor. 512 MB of RAM (1 GB recommended). One of these operating systems: Microsoft Windows 2000 or 2003 Server. Microsoft Windows 2000 Advanced Server with Service Pack 4 or later. Microsoft Windows Server 2003 Enterprise Server with Service Pack 2 or later. One of these email environments: Lotus Domino version 6.0.2 or later. Lotus Domino version 7.0.2. Lotus Domino version 8.0. Internet Explorer 6.0 or later set as the default browser.

Terminal servers

Total Protection Service supports terminal servers and the Windows fast user switching feature in most scenarios, with these limitations: Total Protection Service must be installed on the server by someone with local administrator privileges.

32

Total Protection Service Product Guide

Installing Total Protection Service

Before you install

2

When an installation or update occurs on a terminal server, one session is designated as the primary update session (see Update computers where no user is logged on on page 60 for restrictions that apply to automatic updates). For all user sessions, the Total Protection Service icon is removed from the system tray during the installation or update. The icon is restarted only for the user logged on to the primary update session. All user sessions are protected, and other users can manually redisplay their icons (see Removing and displaying the icon on page 57 for more information). Detection notifications are not displayed on the desktop of all computer users if the fast user switching feature is enabled. If you use an authenticating proxy server, disable the policy option Update client computers where users are not logged in on the SecurityCenter's Advanced Settings tab (see Set advanced virus protection options on page 105).

Before you install

Complete these procedures on each computer to prepare for installing the client software: Uninstall existing virus protection software Uninstall existing firewall software Configure your browser Install the standalone installation agent -- Required if users will install protection services on client computers where they do not have administrator rights.

Uninstall existing virus protection software

Other virus protection software might conflict with the advanced features of Total Protection Service virus protection. When multiple virus scanning engines try to access the same files on your computer, they interfere with each other. Uninstall all virus protection software before installing the Total Protection Service virus and spyware protection service. If you are notified of existing virus protection software on a computer during installation, follow these instructions to remove it. To uninstall existing virus protection software: 1 In the Windows Control Panel, open Add/Remove Programs. 2 In the list of programs, locate any virus protection software (including Total Protection Service), then click Remove. The following lists include products that Total Protection Service detects. In some cases, Total Protection Service uninstalls the software automatically; in other cases, it prompts you to uninstall it.

If you have virus protection software that does not appear on these lists, you must manually uninstall it before installing Total Protection Service.

Caution

33

Total Protection Service Product Guide

Installing Total Protection Service

Before you install

2

McAfee products automatically detected

McAfee Enterprise Anti-Spyware Enterprise (all editions) ePO agent Managed VirusScan (previous editions) Total Protection Enterprise VirusScan Enterprise 8.5i / 8.0i / 7.1 / 7.0 VirusScan 4.5.1 VirusScan 4.0.3 McAfee Retail Internet Security Suite McAfee SecurityCenter Total Protection for Home Users VirusScan Retail 8.0 VirusScan Professional Edition 7.0 / 6.0 VirusScan Home Edition 7.0 / 6.0 VirusScan Retail 5.1.X VirusScan Retail 5.0 for 9x VirusScan Retail-OEM 4.0.3 for 9x

Non-McAfee products automatically detected

Computer Associates eTrust AntiVirus 7.1 eTrust AntiVirus 7.0 Inoculate IT 3.5.1 Inoculate IT 4.5.3 Pest Patrol for spyware (compatibility) Finjan SurfinGuard F-Secure AntiVirus 5.52 Antivirus 2004 (home) Antivirus Client Security (uninstalls AV only) F-Secure Internet Security 2006 Kaspersky AntiVirus Personal AntiVirus Personal Pro Antivirus Business Optimal Microsoft Live OneCare Panda BusinesSecure 2006 (with TruPrevent) (ClientShield is the AV portion) ClientShield (with TruPrevent) EnterpriSecure 2006 (with TruPrevent) FileSecure Platinum Internet Security Titanium Antivirus 2006/2004/2003 WebAdmin Antivirus Sophos Sophos Antivirus Symantec NAV 2006/2004 Internet Security Edition (uninstalls AV only) NAV 2006/2004 Professional (uninstalls AV only) NAV 2002 NAV 8.0 NAV 7.6 for Windows for 9x NAV 7.6 for Windows for NT NAV 7.5.1/7.5 NAV Central Quarantine Norton Internet Security 2006/2004 home & small office editions (uninstalls AV only) Norton Internet Security 2006/2004 Professional home & small office editions (uninstalls AV only) Norton Mobile Update Agent Norton Mobile Update Distribution Console Norton Rescue Disk Norton Systemworks 2006/2004 (uninstalls AV only) Symantec Antivirus 10.3, 10.1, 9.x, 8.1 (all editions) Trend Micro HouseCall (On-Line) OfficeScan PC-Cillin Internet Security 2006 PC-Cillin 2004 Virusbuster Corporate Edition

34

Total Protection Service Product Guide

Installing Total Protection Service

Before you install

2

Uninstall existing firewall software

Before installing the firewall protection service, we recommend that you uninstall any other firewall programs on your computer. Follow your firewall program's instructions for uninstalling or use the Windows Control Panel. To uninstall existing firewall software: 1 In the Windows Control Panel, open Add/Remove Programs. 2 In the list of programs, locate any firewall software (including Total Protection Service), then click Remove.

On computers running Windows XP and Windows Vista, the Windows firewall is disabled automatically during installation of Total Protection Service.

Note

Configure your browser

Total Protection Service requires Microsoft Internet Explorer 5.5 SP2 or later during installation.

Internet Explorer

Total Protection Service works with the default security settings in Internet Explorer. If you are unsure of your settings, use the following steps to verify and configure them. version 5.5 1 From the Windows Control Panel, open Internet Options. 2 On the Security tab, select Internet Zone. 3 Click Default Level. 4 Drag the scrollbar to Medium, then click OK. version 6.x 1 From the Windows Control Panel, open Internet Options. 2 On the Security tab, select Custom Level. 3 From the Reset to menu, select Medium, then click Reset. version 7.x 1 From the Windows Control Panel, open Internet Options. 2 On the Security tab, select Medium-high.

Non-Microsoft browsers

If on your administrative or client computers you typically use a non-Microsoft browser, such as Mozilla Firefox or Opera, you must install Internet Explorer before installing Total Protection Service. After the software is installed, you can continue to use your default Internet browser. You can access the SecurityCenter with Internet Explorer (version 5.5 or later) or Firefox (version 1.5 or later).

35

Total Protection Service Product Guide

Installing Total Protection Service

Before you install

2

Install the standalone installation agent

To allow users without administrator rights to install Total Protection Service on client computers using the URL method, you must first load a standalone installation agent on their client computers. You can use a deployment tool to install it from your administrative computer, or you can download it directly onto the client computers. You must have administrator rights on the client computer to install this file. To deploy the installation agent from your administrative computer: 1 From the SecurityCenter website, click the Help tab, select Utilities, then click installation agent to download the installation agent. 2 Deploy and execute the file on client computers using your customary deployment tools, such as Microsoft Systems Management Server (SMS) installer, Windows NT login scripts, or Tivoli IT Director. To deploy the installation agent from the client computer: 1 From the SecurityCenter website, click the Help tab, select Utilities, then click installation agent to download the installation agent. 2 When the download is complete, double-click the file. After the standalone installation agent is installed on a client computer, any user can install Total Protection Service client software on that computer.

36

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Installing Total Protection Service

Install the client software in any of the following ways: Standard URL installation Use the URL you received in your welcome email message to install the software on your computer and access the SecurityCenter website. Then install the software on other computers using a standard or customized URL, or send the URL to users with instructions on how to install. Advanced Installation options From an administrative computer, visit the SecurityCenter website and use these methods to remotely install the software on one or more computers simultaneously without user interaction. Silent installation Download a program called VSSETUP.EXE, then run it at the command line. This method requires a third-party deployment tool, a login script, or a link to an executable file in an email message. Push installation Download the Push Install utility, then deploy the software directly from your service provider's website.

Standard URL installation

URL installation is the most common installation method. Users install the client software individually, by downloading it from a company-specific URL.

Requirements

To use the Internet URL installation method, the client computer's user must have: Local administrator rights.

Administrator rights are not the default. You need to change the Windows configuration or deploy a standalone installation agent (see Install the standalone installation agent on page 36 for more information).

Note

An Internet connection.

37

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Sending an installation URL to users

As the administrator, you can obtain the company-specific installation URL in two ways: After signing up for Total Protection Service, you receive an email message containing the URL that has been set up for your company. This installation URL installs all the services you have subscribed to into your account's default group in your account's default language. You can copy this URL into an email message to send to the client computer users at your company. At any time, you can log on to your SecurityCenter and create a customized URL to send to users. This enables them to install specific services in a designated group and language. To create a customized installation URL: 1 In your web browser, log on to your SecurityCenter website. 2 From the Computers page, click Add Computer. 3 Select the group to place the client computers in, the services to install, and a language for the software, then click Next. A customized URL is displayed, along with simple instructions for users. 4 Click Select Text and Copy to Clipboard. 5 In your local email application, open a new message and paste the text you have copied. 6 Revise the instructions if needed, then send the email to the users who need to install the software.

Installing on client computers

Administrators and users follow the same procedure for installing the client software. To install using the URL method: 1 On the client computer, open the email message and click the installation URL.

The URL installation method can be used only by client computers with a connection to the Internet, and users must have local administrator rights (see Requirements.)

Note

Total Protection Service installs automatically.

38

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Figure 2-1 Internet URL installation

2 Select the services to install if you are prompted to do so, type your email address in the Email or identifier field, and click Continue. What is the email address used for? The information entered here identifies the computer where the installation is taking place. The SecurityCenter uses it to identify that computer in reports. If reports indicate a problem with a computer, you can use the email address to notify the user. If the user does not enter an email address, it is important to know how to contact the user when security issues arise. 3 When you are prompted to do so, click Install. 4 In the File Download dialog box, click Run. For installation, Total Protection Service uses a cookie created at this time. The cookie expires after 24 hours. If you save the installation file and then try to install it after 24 hours have passed, or delete the cookie, you are prompted to begin the installation process again. 5 On computers running Windows Vista, if the User Account Control dialog box appears, click Continue. 6 Select Restart when prompted to reboot after installing the firewall protection service.

39

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Advanced installation methods

Administrators can use the advanced installation methods to install the Total Protection Service client software without user interaction.

Figure 2-2 Advanced installation methods

Two advanced installation methods are available: Silent installation and Push installation. Select the one that works best for your network.

Advanced installation method The administrator... Performs the installation from Downloads this file Installs the client software on Installs remotely Can designate relay servers (optional) Silent Client computer

VSSETUP.EXE

Push Administrative computer Push Install utility One or more computers Yes Yes (separately from client computers)

One computer No Yes

Some network configurations require additional information to ensure that client software operates correctly (see If you use a corporate firewall or proxy server on page 47).

40

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Silent installation

VSSETUP is an executable file for installing Total Protection Service on a client computer

with no user interaction. This installation method is not network-specific and installs the software on any Windows operating system.

Figure 2-3 How silent installation works

To use silent installation:

1

Download VSSETUP from the SecurityCenter. Deploy to each computer where you want to install the client software. On the computer, open a DOS window and run the VSSETUP command using the appropriate parameters.

2

3

Requirements

To use the silent installation method: You must have a method for installing executable files on your network computers. For example: A third-party deployment tool, such as Novell NAL, ZenWorks, Microsoft Systems Management Server (SMS) installer, or Tivoli IT Director. A login script. A link to an executable file in an email message. A portable medium such as a CD. You should run this program using an account with sufficient rights to install the product. Typically local administrator rights are required, and some methods require remote execution rights. You must know your company key (the series of characters in the installation URL after the characters CK=).

41

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Installation

To install Total Protection Service silently: 1 From your web browser, log on to your SecurityCenter. 2 On the Computers page, click Add Computer. 3 Select the group to place the user's computer in, the services to install, and a language for the software, then click Next. 4 Under Additional Installation Options, click Display advanced installation methods. 5 Under method 1, click VSSETUP to save the VSSETUP.EXE file to your hard drive. 6 Deploy the program to each client computer using your customary deployment tool, such as those listed under Requirements. 7 On a client computer, open a DOS window and run the following command:

VSSETUP.EXE /CK=<your company key> /<parameters>

As shown in this example, you must include your company key (CK) as a parameter. See VSSETUP parameters for a list of optional parameters you can add to your command line. What is my company key? Your company key is included in the URL that you received when you subscribed to Total Protection Service. It is the hexadecimal value that follows the characters CK= at the end of the URL. 8 Reboot the client computer after installing the firewall protection service.

42

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

VSSETUP parameters For a silent installation, use this command line and any of the following parameters (which are not case-sensitive):

VSSETUP.EXE /CK=<your company key> /<parameters>

/CK=XYZ /[email protected]

Required. Launches Setup using the company key. Identifies the user's email address in administrative reports. Note: Despite its name, the email variable does not need to be an email address. Do not use a string containing non-standard characters, because they might display incorrectly in reports.

/Uninstall /SetRelayServerEnable=1

Uninstalls Total Protection Service. Sets a computer with a connection to the Internet as a relay server. If the computer is not used as a relay server, set to 0. Reinstalls Total Protection Service, leaving the previous values for company key, email address, and machine ID intact. Places the computer into any group you have created. You can find the number associated with a group by generating a customized URL (see To create a customized installation URL: on page 38). Note: If you designate a group that does not exist, users are placed in the Default Group.

/Reinstall

/Groupid=[group number]

/P=b /P=f /P=v /P=bf /P=bv /P=fv /P=vfb

Selects the protection service(s) to install: b -- browser protection service. f -- firewall protection service. v -- virus and spyware protection service. Note: If you omit the /P parameter, only the virus and spyware protection service is installed.

Examples

VSSETUP.EXE /vfb /CK=abcd /[email protected] /Groupid=3

The virus and spyware, firewall, and browser protection services are installed. The company key is abcd, the user's email address is [email protected] for reporting purposes, and this user is placed in an existing group represented by the number 3. Generate a customized URL, as described in Sending an installation URL to users on page 38, to find the correct numeric groupid.

VSSETUP.EXE /CK=abcd /[email protected]

Only the virus and spyware protection service is installed. The company key is abcd and the user's email address is [email protected] for reporting purposes.

43

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Push installation

Push means deploying remotely to one or more computers in a network. This method uses the Push Install utility to deploy the client software directly from your service provider's website to client computers on your network. Push installation does not require third-party deployment software or interaction with users. To perform a push installation: Designate an administrative computer, where you will download the Push Install utility and initiate the push. Select the target computers, which are client computers on your network that will receive the software. The Push Install utility is essentially an ActiveX control that runs on an administrative computer. It installs client software on all target computers that are online when the push takes place. Use push installation to install client software on new network computers or to install additional protection services on computers with existing client software. The Push Install utility allows you to specify one or more network computers with an Internet connection as relay servers. You must do so in a separate push operation, because you cannot push to relay servers and non-relay servers at the same time. See Enabling relay servers on page 48 for more information.

Figure 2-4 How push installation works

44

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

To perform a push installation:

1

Download the Push Install utility from the SecurityCenter. Initiate a push to one or more client computers.

2

3

Optional. Initiate a push to one or more relay servers.

Note

Online help for the Push Install utility is available by clicking the help link in any dialog box during installation.

Requirements

To use the push installation method: The administrative computer must be running the Windows 2000, Windows XP Professional, or Windows Vista operating system.

Push installation is not supported on Microsoft Windows XP Home Edition because Windows XP Home Edition cannot log on to an Active Directory domain.

Note

The administrative computer must be running Internet Explorer 5.5 SP2 or later, with ActiveX enabled. At the administrative computer, you must be logged on with domain administrator privileges for the domain being installed. Administrative computers running the Windows firewall and Windows XP Professional or Windows Vista must add File and Print Sharing to the firewall's Exceptions list. For instructions, see the Push Install Help, available by clicking the help link in any dialog box when you run the Push Install utility. All target computers must be logged on to the same Windows domain as the administrator.

Considerations for scheduling push installations

When scheduling push installations: Consider other network tasks. Pushing to a large number of computers simultaneously can produce a high volume of network traffic, so schedule push installations for times when they will not affect other network tasks. Make sure the target computers are turned on. The Push Install utility installs client software on target computers that are online when the push takes place. Make sure users are not using the target computers. Restarting a client computer while a push installation is in progress can cause the computer to become unstable, so schedule push installations for times when users will not be turning off or restarting their computers.

45

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Installation

Back up any vital data on your critical servers before pushing software to them.

Caution

To install Total Protection Service using the Push Install utility: 1 On the administrative computer, open the web browser, log on to the SecurityCenter, then click Install Protection. 2 Select the type of computers to install software on, then click Next. 3 If you are installing to new computers (where no Total Protection Service services are currently installed), select the group where you want to assign the computers. 4 Select the services to install and their language, then click Next. 5 Under Additional Installation Options, click Display advanced installation methods. 6 Under method 2, click Run Push Install utility. A window displays a list of visible computers in your domain.

Figure 2-5 Select target computers and protection services

7 From the left pane, select the target computer(s), then click Add. 8 Optionally, select Set as Relay Server(s) to configure the selected computers as relay servers, which can distribute updates to other computers on the network. See Enabling relay servers on page 48 for details. 9 Select the Total Protection Service service(s) to install, then click Install Components. After installation is complete, a status for each target computer is displayed.

46

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Figure 2-6 Status for target computers

10 Click View Log to open a log file in Microsoft Notepad that shows the status of the current session, then save the file. The dialog box indicates only whether the files were pushed to the target computers. It is important to review the log file to verify that the files were installed and updated successfully. You can also use the log file for troubleshooting. (The contents of the log file are deleted when you close the Push Install utility or perform another push.) 11 Optionally, click Back to return to the previous screen and push to more computers. 12 If you have installed the firewall protection service, restart the client computers.

If you use a corporate firewall or proxy server

Total Protection Service downloads components directly from McAfee servers to client computers. If you are behind a corporate firewall, or are connected to the Internet by a proxy server, you might need to provide additional information for your service to work properly. Authentication support is limited to anonymous authentication or Windows domain challenge/response authentication. Basic authentication is not supported. Advanced installation methods and automatic updating do not support a CHAP or NTLM proxy. If you use an authenticating proxy server, disable the policy option Update client computers where users are not logged in on the SecurityCenter's Advanced Settings tab (see Set advanced virus protection options on page 105). Contact product support if you have proxy questions while installing or updating Total Protection Service.

47

Total Protection Service Product Guide

Installing Total Protection Service

Installing Total Protection Service

2

Enabling relay servers

If any computers on your network do not have a direct connection to the Internet, the Internet Independent Updating (IIU) feature allows them to receive software updates from another local computer. In that case, you must specify at least one computer in your LAN as a relay server.

If all the computers on your network connect to the Internet, you do not need to set up any relay servers. However, you might want to specify relay servers to reduce Internet traffic on your LAN. See Internet Independent Updating (IIU) on page 17 for information on using relay servers.

Tip

You can specify one or more computers as a relay server in two ways: Using the Push Install utility Using VSSETUP

Using the Push Install utility

During the push installation procedure, select Set as Relay Server(s) before clicking Install Total Protection Service (see step 10 under Installation on page 46). You must perform a separate push operation to push files to relay servers and non-relay servers, because you cannot push to both at the same time.

Using VSSETUP

During a silent installation, or at any time after Total Protection Service has been installed on a computer, you can run the vssetup command with the variable that specifies a computer as a relay server. The vssetup syntax differs, depending on whether this is an initial installation or an existing installation. (See Silent installation on page 41 for more information.) Initial installation During an installation, vssetup uses the following syntax to specify a computer as a relay server:

VSSETUP.EXE /RelayServer=1 If you do not specify the computer as a relay server during the installation process, the default is 0 (off), and the computer is not a relay server.

Note

Changing an existing configuration You can edit an existing installation using vssetup with the SetRelayServerEnable parameter. Specify a computer as a relay server:

VSSETUP.EXE /SetRelayServerEnable=1

Change a current relay server computer so that it is no longer a relay server:

VSSETUP.EXE /SetRelayServerEnable=0

48

Total Protection Service Product Guide

Installing Total Protection Service

Using pre-installed and CD versions

2

Using pre-installed and CD versions

When you install a copy of Total Protection Service via a download URL, silent installation, or push installation, the copy is activated and current licensing information is applied automatically. However, when Total Protection Service is pre-installed on a computer by the manufacturer or installed from a CD, additional steps are required to set up the account.

If your copy is Installed from a CD Follow these steps To install the first copy: 1 Install using a CD. 2 Activate the copy of Total Protection Service. 3 During the activation process, enter a license key to install the first copy and create an account. 4 After activation is complete, save the account enrollment key created by the Activation wizard. To install on additional computers: 1 Install using a CD. 2 Activate the copy of Total Protection Service. 3 During the activation process, enter the account enrollment key. See the instructions shipped with the CD for more information. Pre-installed 1 Activate your copy of Total Protection Service (see Activating the copy of Total Protection Service on page 50). 2 During the activation process, if a license key is required, enter the license key located on the McAfee license card shipped with your system. (Some PC makers do not require a license key. If no key is requested, skip this step.) 3 If it is a trial, purchase a full subscription by the end of the trial period (see Purchasing or renewing a full subscription on page 51).

Setting up a pre-installed copy of Total Protection Service

If a copy of Total Protection Service is pre-installed when you receive the computer, one of these options occurs when you turn on the computer: A trial period begins. Activate the trial copy, evaluate the protection features, then purchase a full subscription to extend protection beyond the trial period. A full subscription begins. Activate the subscription, then use the protection features until it is time to renew the subscription. See these topics for more information on using the pre-installed software: When you first turn on the computer Activating the copy of Total Protection Service Purchasing or renewing a full subscription

49

Total Protection Service Product Guide

Installing Total Protection Service

Using pre-installed and CD versions

2

When you first turn on the computer

The first time a network is detected, the pre-installed copy of Total Protection Service updates the detection definition (DAT) files used to detect threats. Then the on-access scanning feature is begins checking all files automatically as they are accessed, and users can perform on-demand scans to check all the files on the computer for threats. To continue receiving updates that protect against new threats, the copy of Total Protection Service must be activated. In most cases, a dialog box reminds users to activate. If they do not activate, their copy of Total Protection Service stops functioning at the end of the activation period. When they attempt to access a feature, a dialog box notifies them that the activation period has ended and offers them the opportunity to purchase a full subscription. For instructions on activating, see Activating the copy of Total Protection Service.

Activating the copy of Total Protection Service

Activate each copy of Total Protection Service to continue receiving DAT file updates that protect against the latest threats. An activated copy checks for updates automatically at regular intervals. After activating a trial version, users will also have an option to purchase a full subscription that extends protection beyond the trial period. To activate the software: 1 On the client computer, click

in the system tray, then select Activate.

2 In the Activation wizard, select the type of account to activate:

Select this option... If you want to... Join an account that has already been set up. An account enrollment key is required. This was provided when the account was set up. View the account enrollment key or create a new one from the My Account page of the SecurityCenter (see Viewing or creating an account enrollment key on page 51).

Join an existing account

Create a new account

If this is the first copy of Total Protection Service that you are activating or purchasing, create a new account. If you purchased multiple licenses for Total Protection Service, you can then add other computers to this account and manage security for all of them.

3 Enter information to identify the account by following the instructions in the Activation wizard. 4 When creating a new account, save the account enrollment key to use when installing Total Protection Service on other computers. You will also receive an email with an installation URL for use when installing Total Protection Service on other computers.

If you are asked to enter a license key and you do not have one, see Activating your license key on page 51.

Note

50

Total Protection Service Product Guide

Installing Total Protection Service

Using pre-installed and CD versions

2

Purchasing or renewing a full subscription

Once a trial is activated, you can extend protection for your computer by purchasing a full subscription during the trial period. A full subscription ensures you continue to receive updates and retain access to features such as on-demand scans, automatic scanning of incoming email and attachments, monitoring of incoming communications for suspicious activity, and up-to-the-minute safety reports while browsing and searching the Internet. When a full subscription nears expiration, you can renew it to ensure uninterrupted protection. To purchase or renew a subscription: Click in the system tray, then select Buy or Renew this subscription. OR In a notification dialog box, select Buy or Renew this subscription. Enter your contact and payment information when prompted.

If a trial or full subscription has expired, Total Protection Service is no longer protecting the computer. When users attempt to access a feature, a dialog box notifies them that their copy has expired and offers them the opportunity to purchase or renew a full subscription.

Note

Viewing or creating an account enrollment key

The account enrollment key is a unique identifier that enables you to add new installations of Total Protection Service to your account. It remains valid for seven days. An account enrollment key is originally created when you activate a new account for a pre-installed copy or a CD version of Total Protection Service. Then this key is required to: Activate new pre-installed copies of Total Protection Service under your account. Add new CD installations to your account. If your key expires or is compromised, create a new one, which becomes effective immediately. To view or create your account enrollment key: 1 On the My Account page in the SecurityCenter, check for an existing key in the Account Enrollment Key section. 2 If no current key is listed, click Create a new key.

Activating your license key

If you do not have a valid license key when you install Total Protection Service, you can obtain one and activate it later. To complete an installation without a license key: 1 During the activation process, select Continue as a trial user.

51

Total Protection Service Product Guide

Installing Total Protection Service

Completing the installation

2

By setting up a trial, your computers remain protected while you obtain a valid license key. 2 From the My Account page click Register license key. 3 Call the number listed for support to obtain a valid license key. 4 Enter the information requested in the form, then click Next. Once you activate your license key, your account becomes a licensed full subscription. Licensing information is also updated automatically for other computers installed under your account.

Completing the installation

After installing Total Protection Service, perform these procedures on each client computer to ensure that the software is working correctly and the computer is protected. (Users can read instructions for performing these procedures in the online Installation Instructions or User Help.) Test virus protection Scan the client computer Scan the email Inbox Set up the default firewall

Test virus protection

Test the virus-detection feature of the virus and spyware protection service at any time by downloading the EICAR Standard AntiVirus Test File at the client computer. Although it is designed to be detected as a virus, the EICAR test file is not a virus. To run a test: 1 Download the EICAR file from the following location: http://www.eicar.org/download/eicar.com If installed properly, the virus and spyware protection service interrupts the download and displays a threat detection dialog box. 2 Click OK, then select Cancel.

If installed incorrectly, the virus and spyware protection service does not detect the virus or interrupt the download process. In this case, use Windows Explorer to delete the EICAR test file from the client computer. Then reinstall Total Protection Service and test the new installation.

Note

Scan the client computer

After installing the virus and spyware protection service for the first time, we recommend running an on-demand scan of all client computer drives before proceeding. This checks for and cleans or deletes existing threats in files. In the future, files are scanned when they are accessed, downloaded, or saved.

52

Total Protection Service Product Guide

Installing Total Protection Service

Completing the installation

2

To scan your computer: 1 Click in the system tray. 2 Select Scan Tasks, then select Scan My Computer.

Scan the email Inbox

After installing the virus and spyware protection service for the first time, we recommend running an on-demand email scan before proceeding. This checks for threats in email already in the client's Microsoft Outlook Inbox. Future emails are scanned before they are placed in the Inbox. To run an on-demand email scan: From the Tools menu in Outlook, select Scan for Threats. The On-Demand Email Scan dialog box appears when the scan starts. You can stop, pause, and restart the scan. You can also check the results of the scan.

Set up the default firewall

To ensure complete protection on computers running Windows XP or Windows Vista, the firewall protection service automatically disables the Windows firewall and configures itself as the default firewall. This enables it to monitor communications for Internet applications and track events for reporting purposes, even if the Windows firewall is also running. We recommend that you do not re-enable the Windows firewall while the Total Protection Service firewall is enabled.

If both firewalls are enabled, the Total Protection Service firewall lists only a subset of the blocked IP addresses in its Inbound Events Blocked by the Firewall report. The Windows firewall blocks some of these addresses; however, it does not report them because event logging is disabled in the Windows firewall by default. If both firewalls are enabled, you must enable Windows firewall logging to view a list of all blocked IP addresses. The default Windows firewall log is C:\Windows\pfirewall.log. Enabling both firewalls also results in duplicate status and alert messaging.

Caution

53

Total Protection Service Product Guide

Installing Total Protection Service

What should I do after installing?

2

What should I do after installing?

After installing Total Protection Service, client computers are protected immediately and no further setup is required for the virus and spyware protection service, the firewall protection service, or the browser protection service. You will receive regular status emails with details about your account. (If you purchased Total Protection Service from a McAfee partner who manages security for you, the partner usually receives these emails.)

If you purchased Total Protection Service -- Advanced, refer to emails and other materials from your service provider for instructions on installing and configuring the additional services. See Chapter 7, Using the Email Security Service for information about activating and setting up the email security service.

Note

You might want to take advantage of additional features to more easily manage your account and customize a security strategy for your specific needs: Setting up your account on page 66. Viewing your security services at-a-glance on page 67. Managing your computers on page 70. Creating groups to manage your site on page 76. Setting up policies on page 81. Viewing reports on page 85. For guidelines on administering an effective security strategy: For virus and spyware protection, see Manage your protection strategy with best practices on page 116. For firewall protection, see Managing suspicious activity with best practices on page 134. For large accounts with many computers, see Recommendation for managing large accounts on page 94. Users configure most browser protection settings on their computers. For descriptions of these features and recommended settings, see Configuring browser protection on the client computer on page 141.

54

3

Using Total Protection Service

Total Protection Service consists of two main components for managing security: The client software: Software installed on each client computer. The client software runs in the background to download updates and protect the computer from threats. It also provides users access to the basic functions of their McAfee protection services, such as scanning files, folders, and email messages. The McAfee SecurityCenter: A website for administrative functions, where you can centrally manage the protection services for your account. Most administrative tasks are performed from the SecurityCenter. Total Protection Service is designed for hands-off management. After installing the software on client computers, you receive regular emails that summarize the security status of all client computers on your account, and notify you of actions required to address vulnerabilities. Status emails contain a link to your SecurityCenter website, where you can view detailed reports and instructions for resolving problems. In small organizations, status emails might be all that is needed to assure you that your computers are safe. If you manage a large account or want more proactive, hands-on involvement, you can take advantage of the tools available on the SecurityCenter. Using the client software Updating client computers Using the SecurityCenter Getting started Setting up your account Viewing your security services at-a-glance Managing your computers Creating groups to manage your site Setting up policies Viewing reports Managing your subscriptions Getting assistance

55

Total Protection Service Product Guide

Using Total Protection Service

Using the client software

3

Using the client software

After installing Total Protection Service, the software runs on each client computer to immediately protect it from threats such as viruses and intrusions. Typically, users have little interaction with the client software unless they want to manually scan for threats. User tasks are documented in the online User Help on client computers. As an administrator, you can most easily use the SecurityCenter website to configure settings and monitor detections for client computers. Occasionally, you might work directly on a client computer. Users and administrators access the client software's features through these components on a client computer: Total Protection Service system tray icon Client menu Administrative menu and tasks

Total Protection Service system tray icon

When Total Protection Service is running on a client computer, the Total Protection Service icon appears in the system tray and indicates the status of the services.

This icon... ....indicates: An update is in progress. Do not interrupt the Internet or LAN connection, or log off the computer. Move the mouse over the icon to display which condition the icon indicates: The last update failed to complete. Check the Internet or LAN connection, then double-click the icon to perform a manual update. On-access scanning is disabled (see Disabling on-access scanning on page 118). The firewall protection service is disabled (see Enable firewall protection on page 122). The service subscription is expired (see Managing your subscriptions on page 89). The pre-installed, CD-based, or trial subscription is not activated (see Activating the copy of Total Protection Service on page 50).

56

Total Protection Service Product Guide

Using Total Protection Service

Using the client software

3

Removing and displaying the icon

When you remove the Total Protection Service icon, the protection services continue to protect the client computer by blocking detections, but do not display any user prompts. To remove the icon from the system tray: 1 On the client computer, hold down the Ctrl and Shift keys and click tray. 2 Select Exit. To display the icon in the system tray: On the client computer, select Start | Programs | McAfee | Total Protection Service | McAfee Total Protection.

in the system

Client menu

Click in the system tray to access these options: Scan Tasks: Displays a submenu for accessing features of the virus and spyware protection service. Firewall Settings: Displays the current status, mode, and connection type for the firewall protection service. If the policy allows users to configure firewall protection, a dialog box for changing settings appears instead. About: Displays information about the software, including the current version of the detection definition (DAT) file. Help: Displays the built-in User Help file, which contains basic information about using product features. Update Now: Checks whether a new update is available; if so, the update downloads automatically. Activate: Displays the activation wizard for a pre-installed or CD-based version of Total Protection Service. The activation process enables a user to join an existing account or create a new account. After activation, the automatic update feature is enabled. (This option appears only for versions that need to be activated.) Buy: Accesses a website where a user can purchase a full subscription. (This option appears only for trial versions.) Renew : Accesses a website where a user can renew an existing subscription. (This option appears only for subscriptions that will soon expire.)

57

Total Protection Service Product Guide

Using Total Protection Service

Updating client computers

3

Administrative menu and tasks

Access administrative features by holding down both the Ctrl and Shift keys when clicking in the system tray: Exit: Removes the Total Protection Service icon from the system tray. See Removing and displaying the icon on page 57 for more information. Scan Tasks | Disable On-Access Scanner: Turns off the automatic on-access scanner. To re-enable the scanner, reopen the administrative menu and select Enable On-Access Scanner. See Disabling on-access scanning on page 118 for more information. Scan Tasks | Quarantine Viewer: Opens the quarantine folder, which contains possible threats detected on the computer. See Manage quarantined files on page 117 for more information. Administrative tasks for client computers are also described in the online User Help on the client computer. However, instructions for accessing the administrative menu are provided only in this Product Guide.

Updating client computers

Total Protection Service automatically updates client computers with new detection definition (DAT) files and other software components. Users can check for updates manually at any time. In addition, you can configure optional policy settings for updating tasks.

Update support for some operating systems is ending. Once support ends, client computers running those operating systems will no longer be protected against new threats. See Operating system support ending on page 29 for more information.

Note

Update automatically

The software on each client computer automatically connects to the Internet directly or to a relay server and checks for updated components. Total Protection Service checks for updates five minutes after a user logs on and at regular intervals thereafter. For example: If a computer is normally connected to the network all the time, it checks for updates at regular intervals throughout the day. If a computer normally connects to the network each morning, it checks for new updates five minutes after the user logs on each day, then at regular intervals throughout the day.

58

Total Protection Service Product Guide

Using Total Protection Service

Updating client computers

3

If a computer uses a dial-up connection, the computer checks for new updates five minutes after dialing in, then at regular intervals throughout the day. By default, computers check for new updates every 12 hours. You can change this interval by configuring a policy setting (see Select your update frequency on page 105).

On computers where a CHAP or NTML proxy is set up in Internet Explorer, automatic updates do not work.

Note

Pre-installed and CD-based versions of t need to be activated before automatic updates occur. See Activating the copy of Total Protection Service on page 50 for more information.

Update manually

At times, users might want to check for udpates manually. For example, when a computer appears to be out-of-date in your administrative reports, users might need to update manually as part of the troubleshooting process. To update manually: Double-click in the system tray, or click the icon and select Update Now.

Update during an outbreak

When an outbreak is identified by McAfee Avert Labs, they issue an outbreak DAT, which is a special detection definition (DAT) file marked as Medium or High importance. It is specially encoded to inform the first computer receiving it to share the update immediately with other client computers on the network.

In rare cases, McAfee might send an EXTRA.DAT file with instructions for manually installing it.

Note

For maximum protection, configure your policies to check for an outbreak DAT file every hour (see Enable optional protection on page 106). This feature is enabled by default.

59

Total Protection Service Product Guide

Using Total Protection Service

Using the SecurityCenter

3

Update computers where no user is logged on

In most scenarios, Total Protection Service supports terminal servers and the Windows fast user switching feature. When an update occurs, one session is designated as the primary update session. A pseudo user is defined, which enables automatic updates to occur on computers where no user is logged on. For certain configurations, automatic updates cannot occur. Total Protection Service cannot create the pseudo user when: The computer is a domain controller. Local security policies, including password restrictions, prevent the user's creation. When the pseudo user cannot be created, automatic updates do not occur. The pseudo user also cannot update if the computer is behind an authenticating proxy server. For these situations, you can disable the Update client computers where users are not logged in policy setting on the SecurityCenter's Advanced Settings tab (see Set advanced virus protection options on page 105). This prevents automatic update attempts from being reported as errors. To disable updates for non-logged-on users: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Advanced Settings tab. 3 Deselect Update client computers where users are not logged in, then click Save.

Using the SecurityCenter

Access the administrative features of Total Protection Service from the online SecurityCenter. The SecurityCenter offers tools for administrators who manage many computers or want to assume a proactive role in overseeing their corporate security strategy. Use the SecurityCenter to centrally manage the client computers and information for your account. For every category of account management, you can access all the tasks you need to perform from the SecurityCenter:

60

Total Protection Service Product Guide

Using Total Protection Service

Using the SecurityCenter

3

When you are... Setting up your account

Perform these tasks from the SecurityCenter Set up your profile Select the language for your account Change your SecurityCenter password Sign up for email notifications

Viewing your security services at-a-glance

Install protection services View and resolve action items View security coverage for your account

Managing your computers

Search for computers Display details for a computer View detections for a computer View and manage user-approved applications for a computer Send email to computers Block computers from receiving updates Delete computers from your reports Move computers into a group

Creating groups to manage your site Designating group administrators Setting up policies

Create, view, and manage groups Create or edit a group administrator Delete a group administrator Create or edit a policy Assign a policy to a group Restore default policy settings Delete a policy

Viewing reports

View detections View unrecognized programs View unrecognized Internet applications View inbound events blocked by the firewall View duplicate computers View computer profiles View your detection history

Managing your correspondence

Send email to users Update user email addresses Update your account's email address Add your logo to reports

Managing your subscriptions

View your service subscriptions Update subscription information Purchase, add, and renew services Request a trial subscription Receive subscription notifications

Getting assistance

View printed and online documents Download utilities Contact product support View demos and tutorials

61

Total Protection Service Product Guide

Using Total Protection Service

Getting started

3

Getting started

The SecurityCenter website helps you locate information easily. Log on to the SecurityCenter Access online features and functions Make the most of your online data Customize listings and reports Using the online help

Log on to the SecurityCenter

You must use your unique user name and password to log on to the SecurityCenter. 1 Obtain the URL for your SecurityCenter in the login credentials email you received from your service provider (see After you place your order on page 28). 2 Paste or type the URL into your browser. 3 Type your login credentials:

Email Address Password

The email address that you used to sign up for Total Protection Service. In most cases, the password that you created when signing up.

4 Click Log In. At any time after logging on, you can change your password by updating your user profile (see Change your SecurityCenter password on page 67). Your password is case-sensitive and must be a minimum of six characters. You can also access multimedia demos and tutorials before logging on (see View demos and tutorials on page 94).

Access online features and functions

Administrative features are divided among six pages:

SecurityCenter Computers Reports Groups + Policies My Account Help

62

Total Protection Service Product Guide

Using Total Protection Service

Getting started

3

Figure 3-1 SecurityCenter tabs

63

Total Protection Service Product Guide

Using Total Protection Service

Getting started

3

Make the most of your online data

Each SecurityCenter page includes features for displaying the exact data you need and using it efficiently.

Figure 3-2 Page controls for listings and reports

1

2

3

4

5 7 8

6

When you want to...

1

Do this... Click Print to open the page in a separate browser window, then select Send to printer to open the Windows Print dialog box. Click Email to open a blank email message to fill out, then click Send. (You must have a local email application installed to use this feature.) Click Save As, then select the file format you want. Click the number of entries to display, or click Go to page to display a specific page. Select the checkbox for individual computers, or select the checkbox in the heading to select all computers. Problems that require your attention appear in red. Display instructions for resolving them by clicking the corresponding action item. See View and resolve action items on page 69. Click a computer name in a listing. Click an email address in the listing to open a blank, preaddressed message. (You must have a local email application installed to use this feature.)

Print the current page.

2

Send the current page as an email attachment.

3

Save the current page.

4

Navigate in multiple-page listings.

5

Select computers to manage.

6

Check your action items.

7 8

Display details about a computer. Send email to a computer.

64

Total Protection Service Product Guide

Using Total Protection Service

Getting started

3

Customize listings and reports

Select the information to display or the order in which it appears. To filter information: At the top of a page, select the information to display (such as group name, period of time, or type of information). For greater flexibility in managing large accounts, select whether to display groups or individual computers. To sort information in listings: Click a column heading to sort by that column. Click it again to switch the order in which it is displayed (ascending order or descending ).

Using the online help

Online help is available from any page on the SecurityCenter website by clicking the help ( ? ) link in the top-right corner of the page. The help window provides information about the page from which it was called. You can access additional information with the table of contents, the index, or the search feature. Help navigation procedures

To... Navigate back to page that initially appeared or from which you clicked a link Do this... Click Back on the shortcut menu. Note: Do not use the Previous or Next buttons. They are used to navigate through the linear order of pages in the table of contents. (Show Navigation). (Previous and Next). (Related Links).

View the table of contents, index, and search from a single help pane Page through the help as ordered in the table of contents View related how-to topics

Click Click

Click Locate an item alphabetically within the index Print a page Click menu. Create a bookmark of a page for an HTML browser Conduct a search Remove highlighted text on a page after a search Click

Click Index in the left pane.

(Print), or click Print on the shortcut

(Bookmark).

Click Search in the navigation pane, enter the word or words to search on, and click Go. Click Refresh on the shortcut menu.

65

Total Protection Service Product Guide

Using Total Protection Service

Setting up your account

3

Setting up your account

Configure your contact information so that you receive important notices from your service provider. Set up your profile Select the language for your account Change your SecurityCenter password Sign up for email notifications

Set up your profile

Your profile contains the information your service provider needs to contact you about your account. Initially, information supplied during your product purchase is placed into your profile. It is important to keep this information up-to-date to prevent a disruption in your services.

We recommend changing the administrator's email address that you use to access the SecurityCenter (for example, [email protected]), so that if the current administrator for Total Protection Service leaves the company, the administrative email address is easily transferred to the new administrator.

Tip

To configure your profile: On the My Account page under My Profile, click Edit, configure your options, then click Save.

Select the language for your account

Select the language for your status reports and other McAfee correspondence by editing your profile. To select your language: 1 On the My Account page under My Profile, click Edit. 2 Under Language Information, select a Default language, then click Save. Brazilian Portuguese Chinese Simplified Chinese Traditional Dutch English French

German Italian Japanese Korean Portuguese (Iberian) Spanish

Language support might change in subsequent versions of Total Protection Service.

Note

66

Total Protection Service Product Guide

Using Total Protection Service

Viewing your security services at-a-glance

3

Change your SecurityCenter password

We recommend that you change your password when you first visit the SecurityCenter and at regular intervals thereafter. To change your password: 1 On the My Account page under My Profile, click Edit. 2 Under Your Contact Information, type and confirm a new password.

Sign up for email notifications

Sign up for email notifications about your account status, service expiration, and service utilization. Also specify the language for your notifications.

Status emails keep you informed about detections and coverage for your account. It is important to receive status emails at regular intervals that are appropriate for your account, based on the frequency with which you need to review detection information. By default, you receive status emails Weekly.

Note

To configure your notification preferences: On the My Account page under My Preferences, click Edit.

Viewing your security services at-a-glance

The SecurityCenter page is your "home" page on the SecurityCenter website -- a graphical overview of your coverage with instant access to summary information about the computers and service subscriptions in your account. Your status emails contain an overview of the information shown on the SecurityCenter page and notify you when you need to check your SecurityCenter website. What can I do from the SecurityCenter page? The SecurityCenter page shows the current status for your account. It's your "one-stop service center," where you can install services, check for problems, check your security coverage, or check and update your subscriptions. Access the SecurityCenter page at any time by clicking the SecurityCenter tab.

67

Total Protection Service Product Guide

Using Total Protection Service

Viewing your security services at-a-glance

3

Figure 3-3 SecurityCenter page

Select the information that appears on this page:

Groups -- Display only the computers in a group or display all computers.

From the SecurityCenter page, you can: Install protection services View and resolve action items View security coverage for your account Purchase, add, and renew services Request a trial subscription

Install protection services

From the SecurityCenter, you can begin the installation process in two ways: On the SecurityCenter page, click Install Protection. OR On the Computers page, click Add Computer. See Chapter 2, Installing Total Protection Service for more information.

68

Total Protection Service Product Guide

Using Total Protection Service

Viewing your security services at-a-glance

3

View and resolve action items

Action items are security issues that need your immediate attention and are listed in red on the SecurityCenter page or Computer Details page. Whenever you see information highlighted in red, check for a corresponding action item on one of those pages. Possible action items are:

One or more computers have joined your account. Computers are not protected against the latest threat. You have no virus and spyware protection installed. Click here to install protection. You have no desktop firewall protection installed. Click here to install protection. Too many subscriptions in use. Your subscription is about to expire. Your subscription has expired. Your email is being spooled. Please check your email server. Your email security service needs to be activated.

New pre-installed software has been activated on one or more computers in your account. One or more computers are not updated with the latest detection definition (DAT) files or software components. Either you have not installed the virus and spyware protection service on client computers or the installation failed. Click the action item to begin installation.

Either you have not installed the firewall protection service on client computers or the installation failed. Click the action item to begin installation. You have installed Total Protection Service on more computers than you are licensed for. You need to uninstall from some computers or purchase additional licenses. Your subscription to one or more protection services will expire soon and needs to be renewed. Your subscription to one or more protection services is no longer valid and needs to be renewed. Your organization's email is being stored temporarily on your service provider's server because your email server is not accepting email. Your subscription to the email security service has not been activated; you need to proceed with the activation process.

To view instructions for resolving an action item: On the SecurityCenter page or the Computer Details page, click an action item.

View security coverage for your account

For each protection service, a pie chart shows the status of client computers in your account.

This color... Red Green Gray Indicates... Out-of-date or unprotected computers. Up-to-date or protected computers. Computers where the protection service is not installed.

To view details about protection coverage for your account: Click a color to show details about computers in a category.

69

Total Protection Service Product Guide

Using Total Protection Service

Managing your computers

3

The Product Coverage page lists details about the computers with the corresponding level of coverage.

Managing your computers

The SecurityCenter provides a centralized location for working with all the computers in your account. You can instantly view each computer's group and email address, when it last connected to the network, whether its detection definition (DAT) file is current, the number of detections, and the number of Internet applications approved by its user. You can easily see which computers need your attention, display additional information, and perform necessary management tasks. Click the Computers tab to display the Computers page, which lists all the computers in your account or only the computers in a selected group.

Figure 3-4 Computers page

Select the information that appears on this page: View -- Display individual computers or groups.

Groups -- Display only the computers in a group or display all computers. (Not available when the View | Groups filter is selected.) Report period -- Specify the length of time for which to display information. Computer status -- Show all computers, or only out-of-date computers, computers

with detections, or computers you have blocked from receiving updates. For example, you can check whether there are security issues within specific groups. For groups that regularly download files from Internet sites, you might want to monitor the number and type of detections, then modify the security settings to approve safe programs and block communications from sites you distrust.

The Computers page lists up to 1000 computers. For larger accounts, we recommend organizing your computers into groups of no more than 100 computers to optimize SecurityCenter performance.

Note

70

Total Protection Service Product Guide

Using Total Protection Service

Managing your computers

3

From the Computers page, you can: Search for computers Install protection services Display groups or individual computers Display details for a computer View detections for a computer View and manage user-approved applications for a computer Send email to computers Block computers from receiving updates Delete computers from your reports Move computers into a group What computer management reports are available? Use the Reports page to access two reports that can assist you with computer management: View duplicate computers View computer profiles

Search for computers

Use this feature to find a particular computer in your listings. Site administrators can search the entire account; group administrators can search only the groups their site administrator has assigned to them. (See Designating group administrators on page 78 for information on group administrators.) To search for a computer: At the top of the Computers page, type a full or partial computer name, email address, IP address, or relay server name in the Find computers box, then click Search.

The computer search feature does not recognize wildcard characters. You must use only letters or numbers.

Note

Install protection services

From the SecurityCenter, you can begin the installation process in two ways: On the SecurityCenter page, click Install Protection. OR On the Computers page, click Add Computer. See Chapter 2, Installing Total Protection Service for more information.

71

Total Protection Service Product Guide

Using Total Protection Service

Managing your computers

3

Display groups or individual computers

For large accounts, use the View filter to display either groups or individual computers on the Computers page and some reports. You can then drill down within a group to view the computers in only that group.

The Computers page and reports list up to 1000 computers. For larger accounts, we recommend organizing your computers into groups of no more than 100 computers to optimize SecurityCenter performance.

Note

Viewing all your computers in groups provides greater efficiency in checking security status for large accounts and improves the performance of the SecurityCenter. To view all the groups in your account: 1 On the Computers page, select View | Groups. 2 Click a group name to display the computers in that group.

Display details for a computer

Use the Computer Details page to check information about a computer and manage its security. To display details about a computer: On the Computers page, click a computer name. The Computer Details page displays information about the computer, its service components, and its detections.

72

Total Protection Service Product Guide

Using Total Protection Service

Managing your computers

3

Figure 3-5 Computer Details page

1 2

3

4

5

When you want to...

1

Do this... For System email address, type a new email address, then click Save. For Group, select a group from the list, then click Save. Click the red action item. Under Detections, click a quantity in the Detections or User-Approved Applications column. In the User-Approved Applications List, click Allow, select the policies to add the approved applications to, then click Save. Note: You can select up to 10 policies at a time. Only the policies for which the application is not approved are listed.

Update the email address.

2

Move the computer into a new group. Display instructions for resolving an action item. Display details about detections.

3

4

5

Add user-approved applications to one or more policies.

73

Total Protection Service Product Guide

Using Total Protection Service

Managing your computers

3

View detections for a computer

Use this feature to view all the detections for a single client computer. To view detections: 1 On the Computers page, click a quantity under Detections to display a list of detected items and their status. 2 From the Detection List, click the name of a detection to display detailed information from the McAfee Avert Labs Threat Library.

View and manage user-approved applications for a computer

Use this feature to see which programs users have approved and add one or more to a policy. Users can add approved programs and allowed Internet applications only if their policy permits. To view user-approved applications: On the Computers page, click a quantity under User-Approved Applications to display a list of potentially unwanted programs detected by the virus and spyware protection service and Internet applications detected by the firewall protection service. These programs were detected as potential threats, but users have approved them to run on their computers. To add a user-approved application to a custom policy: 1 On the Computers page, click a quantity under User-Approved Applications to display a list of applications that one or more users have approved to run on their computers. 2 In the User-Approved Application List, click Allow, select the policies to add the application to, then click Save. You can select up to 10 policies at a time. OR To remove an application from a policy, in the User-Approved Application List, click Block, select the policies, then click Save.

Blocking a user-approved application in a policy does not override approvals already submitted by users. To prevent users from approving applications, select Protect mode (see Select a spyware protection mode on page 108 and Select a firewall protection mode on page 123).

Note

To add a user-approved application to the McAfee Default policy: If you are using the McAfee Default policy, you must first create a custom policy, then add allowed applications and assign the new policy to your computers. See Create or edit a policy on page 83 for more information.

74

Total Protection Service Product Guide

Using Total Protection Service

Managing your computers

3

Send email to computers

Use this feature to notify users about problems with their computers or tasks they need to perform. You must have a local email application installed on your administrative computer. To send email to computers: On the Computers page, click an email address for a computer in the listing. OR Select the checkbox next to each computer you want to send email to, then click Email. Your local email application opens a blank message, preaddressed (in the BCC field) to the selected computers.

Block computers from receiving updates

Use this feature to prevent unauthorized computers that are connecting to your network (sometimes called rogue systems) from receiving service updates. To block computers: On the Computers page, select the computers you want to block, then click Block. To unblock computers: On the Computers page, select Blocked to list all blocked computers, then select the computers you want to unblock and click Unblock.

Delete computers from your reports

Use this feature to remove obsolete computers and duplicate computers from your listings. Duplicates typically appear when the Total Protection Service client software has been installed more than once on a single computer or when users install it on their new computers without uninstalling it from their previous computers.

Deleting a computer does not uninstall the Total Protection Service client software. If you mistakenly delete a computer with working client software from the report, it automatically reappears in your listing the next time its report data is uploaded. However, you will no longer be able to view the historical detection data for that computer.

Note

To delete computers: On the Computers page, select the computers you want to delete, then click Delete. See View duplicate computers on page 86 for information on displaying a complete listing of duplicate computers in a report.

75

Total Protection Service Product Guide

Using Total Protection Service

Creating groups to manage your site

3

Move computers into a group

Every client computer is part of a group (see Creating groups to manage your site on page 76 for more information). Initially, you assign computers to a group when installing Total Protection Service. If no group is specified, computers are placed in the Default Group. You can move computers into a different group at any time. To move computers: 1 On the Computers page, select the computers you want to move. 2 From the Move to list, select the group you want to move the computers to. You must create the group before you can move computers into it. See Create, view, and manage groups on page 77. 3 Click Move.

Creating groups to manage your site

A group consists of one or more computers that use the same policy of security settings. You can base groups on geographic location, department, computer type, the tasks performed by the users, or anything meaningful to your organization. By default, every computer in your account is placed into a group called Default Group (see The Default Group on page 77). You can create other groups to place them in instead. Why use groups? Groups help you manage large numbers of computers or computers that use different security settings (defined in policies). Groups are particularly helpful in larger organizations or companies that are widely distributed geographically. Placing similar computers into a single group enables you to view and manage security issues for the group separately from the other computers in your account. For example, you might place all laptops used by traveling sales representatives into a single group called Sales Team. Then you can configure special security settings for those computers to provide greater protection against threats in unsecure networks such as airports and hotels. You can also track the number of detections on those computers through more frequent reports and adjust the security settings as needed. See User groups on page 20 for an illustration. Tips for large accounts To more efficiently monitor large accounts and optimize SecurityCenter performance, we recommend that you organize your computers into groups of no more than 100 computers. This enables you to use use the View filter to display reports and computer status by group, then drill down to see the individual computers within a group as needed. How can I manage groups? The Groups + Policies page displays the groups in your organization. If you have not created any groups or policies, only the Default Group is displayed.

76

Total Protection Service Product Guide

Using Total Protection Service

Creating groups to manage your site

3

Figure 3-6 Groups + Policies tab (Groups view)

From this page, with View | Groups selected, you can: Create, view, and manage groups

Computers are assigned to a group when protection services are installed. You can also move computers to different groups using the Computers page.

Note

The Default Group

Until you create additional groups, all computers where you install your security services are assigned to the Default Group. Also, if you delete a group that contains computers, they will be moved into the Default Group. You cannot change the name of the Default Group.

Create, view, and manage groups

Use these procedure to create and manage your groups.

To do this... View all your groups Create a group Follow these steps... On the Groups + Policies page, select View | Groups. 1 On the Groups + Policies page, click Add Group, specify a name for the new group, then click Save. 2 Move computers into the group (see Move computers into a group on page 76). Assign a policy to a group On the Groups + Policies page, select Assign Policy, select a policy from the list, then click Save. On the Groups + Policies page, select Rename, specify a new name for the existing group, then click Save. On the Groups + Policies page, select Delete, then click OK. Note: You cannot delete the Default Group. If you delete a group that contains computers, they will be moved into the Default Group.

Rename a group

Delete a group

77

Total Protection Service Product Guide

Using Total Protection Service

Designating group administrators

3

Designating group administrators

Group administrators oversee and manage the groups that you, the site administrator, assign to them. When creating group administrators, you specify which groups they manage, a password they use to access the SecurityCenter, and their access level. Why use group administrators? Create group administrators to distribute security management in large organizations. Group administrators have fewer access rights than the site administrator. While the site administrator can access all security information for all client computers in the account, group administrators can access information only for client computers in the groups they are assigned to.

Figure 3-7 Site and group administrators

78

Total Protection Service Product Guide

Using Total Protection Service

Designating group administrators

3

1

The site administrator communicates directly with the SecurityCenter to create policies, check reports, and maintain the Total Protection Service account. The site administrator creates and manages group administrators.

2

3

Group administrators communicate directly with the SecurityCenter to access security data for the groups they are assigned to. Group administrators manage the client computers in their assigned groups. The management tasks they can perform and the information they can access on the SecurityCenter depend on the type of group administrator account set up for them. The site administrator can manage all client computers in all groups.

4

4 5

What can group administrators do? The access level you assign determines which tasks group administrators can perform for their groups.

Basic tasks for Read Only Access the SecurityCenter website (see Getting started). Note: No subscription information is visible. Only the assigned groups are visible. Manage from client computers (using the administrative menu): Manage quarantined files. Disabling on-access scanning. View computers from the SecurityCenter (see Display details for a computer). Check data in reports (see Viewing reports). Additional tasks for Read & Modify Reports Install protection services. View and manage computers from the SecurityCenter (see Managing your computers). View policies (see Setting up policies). Rename groups (see Create, view, and manage groups). Modify the information in listings and reports: Send email to computers. Block computers from receiving updates. Delete computers from your reports. Move computers in and out of groups (see Move computers into a group). Send email to users. Send reports to users in email (see Make the most of your online data).

79

Total Protection Service Product Guide

Using Total Protection Service

Designating group administrators

3

Create or edit a group administrator

Use the My Account page to manage group administrators. Up to six group administrators can be listed on this page. If you have created more than six group administrator accounts, click All group administrators to display a complete listing. To create or edit a group administrator: 1 On the My Account page, in the Group Administrator section, click Add or Edit. 2 On the Manage Group Administrators page, select Create New or select the name of an existing group administrator. 3 Type the group administrator's name, email address, and password. The password you assign is used to log on to the SecurityCenter and must be different from your password. Administrative rights based on the group administrator's access level will be assigned to this password. 4 Select an access level and which groups to manage. 5 Click Save to return to the My Account page. 6 On the line where the new group administrator's name appears, click Email Password. Your local email application opens a preaddressed message explaining how to log on to the SecurityCenter, assigned groups, and instructions for accessing information about their responsibilities. (You can use this feature only if you have a local email application installed.) 7 Send the email message.

Delete a group administrator

For security purposes, be sure to delete obsolete accounts for group administrators. To delete a group administrator: On the My Account page, in the Group Administrators section, click Delete.

80

Total Protection Service Product Guide

Using Total Protection Service

Setting up policies

3

Setting up policies

Policies are made up of security settings for all of your protection services. These settings define how your services operate on client computers. Why use policies? Policies enable you to customize security settings for your entire organization or for different computers in your organization. Each policy is assigned to a group of computers. If you have created multiple groups, you can assign a unique policy to each group or allow them to share a single policy. For example, you might place all laptops used by traveling sales representatives into a single group called Sales Team. You can then assign a policy with high security settings that will provide greater protection against threats in unsecure networks such as airports and hotels. Whenever you want to adjust those setting, simply change the policy. Your changes will be applied to all the computers in the Sales Team group automatically. There is no need to update each computer's setting individually. See Customized policies on page 21 for an illustration. How can I manage policies? The Groups + Policies page displays all your policies. If you have not created any policies, only the McAfee Default policy is displayed (see The McAfee Default policy).

By default, the Groups + Policies page displays the groups in your account. Select View | Policies to display a list of policies.

Note

Figure 3-8 Groups + Policies tab (Policies view)

From this page, with View | Policies selected, you can: Create or edit a policy Assign a policy to a group Restore default policy settings Delete a policy Can users change their security settings? The policy determines whether users can change their security settings.

81

Total Protection Service Product Guide

Using Total Protection Service

Setting up policies

3

The McAfee Default policy

Until you create additional policies, all computers are assigned the McAfee Default policy, which is configured with settings recommended by McAfee to protect many environments. You cannot rename or modify the McAfee Default policy. When you create a new policy, the default settings appear as a guideline. This enables you to configure only the settings you want to change without having to configure them all. When you delete a policy that is assigned to one or more groups, the McAfee Default policy is assigned to those groups automatically.

Tab Default setting

Virus Protection Spyware Protection Desktop Firewall

On-Demand Scan: Off Spyware Protection Status: On Spyware Protection Mode: Prompt Automatically install the desktop firewall on all computers using this policy: Disabled Firewall Configuration: User configures firewall Firewall Status: On Firewall Protection Mode: Prompt Connection Type: Untrusted Report Blocked Events: Off Use Smart Recommendations to automatically approve common Internet applications: Enabled

Browser Protection Advanced Settings

Automatically install browser protection on all computers using this policy: Enabled Update client computers where users are not logged in: Enabled Display support notifications on client computers: Enabled

Virus protection:

Enable outbreak response: Enabled Enable buffer overflow protection: Enabled Enable script scanning: Enabled Scan email (before delivering to the Outlook Inbox): Enabled Scan all file types during on-access scans: Enabled Scan compressed archives during on-access scans: Disabled Scan compressed archives during on-demand scans: Enabled Check for updates every: 12 hours

Spyware protection: All programs types are enabled.

Note

With the default Advanced Settings configuration, it is possible for an on-demand scan to detect threats in archived files that are not detected during an on-access scan. This is because on-access scans do not look at compressed archives by default. If this is a concern for your organization, you should enable this option.

82

Total Protection Service Product Guide

Using Total Protection Service

Setting up policies

3

Create or edit a policy

Use this procedure to name a policy and configure its security settings. To create or edit a policy: 1 On the Groups + Policies page, click Add Policy. OR On the Groups + Policies page, select View | Policies, then select Edit Policy. 2 In the Add Policy window, type a name in the Policy name box. (If you are editing an existing policy, the name appears automatically in the Edit Policy window.) 3 Configure the settings on each tab. Initially, options are configured with the McAfee Default policy settings. See Set basic virus protection options on page 103 and Set advanced virus protection options on page 105 to configure virus protection settings. See Set basic spyware protection options on page 107 and Set advanced spyware protection options on page 110 to configure spyware protection settings. See Configuring policies for firewall protection on page 120 to configure firewall protection settings. See Configuring browser protection from the SecurityCenter on page 140 to configure browser protection settings. See Update computers where no user is logged on on page 60 to prevent error logging for computers that are unable to update automatically. See Notifying users when support ends on page 30 to display a message on client computers when support for the operating system is changing. 4 Click Save.

Assign a policy to a group

After you create a policy, assign it to a group by editing the group. To assign a policy to a group: 1 On the Groups + Policies page, select View | Groups. 2 Next to the group you want to assign a policy to, select Assign Policy. 3 Select a policy from the list, then click Save.

83

Total Protection Service Product Guide

Using Total Protection Service

Setting up policies

3

Restore default policy settings

Use this procedure to change all settings on all tabs of a custom policy to the original McAfee Default policy settings. To restore a policy to the McAfee Default settings: 1 On the Groups + Policies page, select View | Policies, then select Edit Policy next to the policy you want to modify. 2 On any tab, click Reset to Defaults to restore all the settings for all tabs. 3 Make adjustments to any of the default settings as needed. 4 Click Save.

These changes do not take effect until you click Save. You have the opportunity to cancel the changes or to modify individual settings before saving.

Caution

Delete a policy

Use this procedure to remove a policy you have created from your account. You cannot delete the McAfee Default policy. To delete a policy: On the Groups + Policies page, select View | Policies, then select Delete for the policy you want to remove.

If you delete a policy that is assigned to one or more groups, the McAfee Default policy will be assigned to those groups.

Note

84

Total Protection Service Product Guide

Using Total Protection Service

Viewing reports

3

Viewing reports

Whenever a client computer checks for updates, it also sends its scanning history, update status, and detections to the SecurityCenter website in encrypted XML files. It uploads the data directly through an Internet connection or via a relay server. You can view this data in reports accessed from the Reports page. All client computers on your account (using the same company key) appear in the reports.

Figure 3-9 Reports page

Why use reports? Reports provide valuable tools for managing your security strategy. Only the reports available for the installed protection services appear on this page.

Use this report... To view... The types of potentially malicious code or unwanted programs that have been found on your network. Use this report to manage detections of viruses and potentially unwanted programs. See View detections on page 111 for instructions.

Detections

Unrecognized Programs

Programs that your spyware protection or firewall protection detected on your network. Use this report to manage your potentially unwanted program detections and Internet applications blocked by the firewall protection service. You can add approved programs and allowed Internet applications to policies directly from the report. See View unrecognized programs on page 113 and View unrecognized Internet applications on page 132 for instructions.

Inbound Events Blocked by Firewall

Computers where inbound or outbound communications were blocked by the firewall protection service. Use this report to manage blocked communications. See View inbound events blocked by the firewall on page 133 for instructions. Note: For blocked events to be reported, the Report blocked events option must be enabled on the Desktop Firewall policy tab (see Enable tracking of blocked events on page 129). Blocked events are logged for all computers that are assigned a policy where this option is enabled.

85

Total Protection Service Product Guide

Using Total Protection Service

Viewing reports

3

Use this report...

To view... Computers that appear more than once in administrative reports. Use this report to track down obsolete computers and those where Total Protection Service has been incorrectly overinstalled and tracked as multiple installations. See View duplicate computers on page 86 for detailed instructions.

Duplicate Computers

Computer Profiles

The version of the Windows operating system and the Internet Explorer web browser running on each client computer. Use this report to locate computers where you need to install software patches for a specific browser or operating system. See View computer profiles on page 87 for detailed instructions.

Detection History

A graphical summary of the number of detections and the number of computers where detections occurred on your network over the past year. Use this report to evaluate the effectiveness of your security strategy. See View your detection history on page 115 for instructions.

Email Security Reports

A page on the email security service's portal, where you can access reports on your site's mailflow and detections. (Available only for Total Protection Service -- Advanced accounts running the email security service.) Use these reports to monitor email activity and detections. See Viewing reports for the email security service on page 151 for instructions.

Can I customize reports? Select the data to display (see Customize listings and reports on page 65). Print a report, save it, or send it to users (see Make the most of your online data on page 64). Add a customized logo (see Add your logo to reports on page 89).

View duplicate computers

Use the Duplicate Computers report to locate computers that are listed more than once in your reports. Duplicate listings usually result when the Total Protection Service client software has been installed more than once on a single computer or when users install it on their new computers without uninstalling it from their previous computers.

Figure 3-10 Duplicate Computers report

86

Total Protection Service Product Guide

Using Total Protection Service

Viewing reports

3

Select the information that appears in this report: Groups -- Display only the computers in a group or display all computers. To delete a duplicate computer: Select the checkbox next to the name of the duplicate computer in the report, then click Delete.

Deleting a computer does not uninstall the Total Protection Service client software. If you mistakenly delete a computer with working client software from the report, it automatically reappears in your listing the next time its report data is uploaded. However, you will no longer be able to view the historical detection data for that computer.

Note

To view details about a computer: Click a computer name to display the Computer Details page. The Computer Details page displays information about the computer, its service components, and its detections. See Display details for a computer on page 72 for information about tasks you can perform from this page.

View computer profiles

Use the Computer Profiles report to view the version of the Windows operating system and the Internet Explorer web browser running on client computers. This helps you locate computers for maintenance, such as installing Microsoft software patches.

Figure 3-11 Computer Profiles report

Select the information that appears in this report: Groups -- Display only the computers in a group or display all computers.

Operating system version -- Display computers running all Windows operating

systems or only those running the selected version.

Browser version -- Display computers running all versions of Internet Explorer or only those running the selected version.

87

Total Protection Service Product Guide

Using Total Protection Service

Managing your correspondence

3

Managing your correspondence

Use SecurityCenter features to simplify and customize your correspondence with users, customers, and your service provider. Send email to users Update user email addresses Update your account's email address Add your logo to reports

Send email to users

Use email to send important information about corporate security to your users: Send reports or listings as an attached archived web page in .MHTM format (see Make the most of your online data on page 64). Send descriptions of security issues on client computers or instructions for required maintenance (see Send email to computers on page 75).

You can use this feature only if you have a local email application installed.

Note

Update user email addresses

Users can enter their email address when installing Total Protection Service. It is important for you to update their email addresses as they change. To update a user's email address: 1 In any listing, click a computer name link. 2 On the Computer Details page, type a new email address, then click Save.

Update your account's email address

Keep the email address for your account up-to-date to prevent lapses in receiving your status emails and other account correspondence from your service provider. To update your account's email address: 1 On the My Account page, in the My Profile section, click Edit. 2 On the Customer Profile page, type your new email address in the first text box, then click Save.

88

Total Protection Service Product Guide

Using Total Protection Service

Managing your subscriptions

3

Add your logo to reports

To customize your correspondence, you can upload a logo that appears in the upper-right corner of the SecurityCenter website, including reports you send to users. Logo files can be .GIF, .JPEG, .JPG, or .PNG format. Logo dimensions must be 175 x 65 pixels with a file size under 500 KB. Other dimensions will result in a stretched or shrunken logo. To upload a logo: 1 On the My Account page, in the My Logo section, click Edit. 2 On the Manage Logo page, click Upload Logo. (To replace an existing logo, click Upload New Logo.) 3 On the Upload Your Logo page, type the name of the file you want to upload or browse to locate the file. 4 In the Verification Code box, type the characters displayed in the black box. (Alphabetic characters are not case-sensitive.) 5 Click Upload Logo. If your logo file is not the correct size, the SecurityCenter resizes it to fit the allotted area and displays a preview of how it will appear on reports. Click Approve to accept the resized logo, or Delete and Resubmit to select a different file. 6 Click Close Window. To delete a logo: 1 On the My Account page, in the My Logo section, click Edit. 2 On the Manage Logo page, click Delete Logo. 3 Click Cancel to return to the My Account page.

Managing your subscriptions

The SecurityCenter includes tools to help you keep track of your service subscriptions. View your service subscriptions Update subscription information Purchase, add, and renew services Request a trial subscription Receive subscription notifications Merge another account into your account

89

Total Protection Service Product Guide

Using Total Protection Service

Managing your subscriptions

3

View your service subscriptions

Check the status of your subscriptions to ensure your protection services remain active and you have the right number of licenses to protect new computers as your organization grows. To view your protection services summary: Click the My Account tab or the SecurityCenter tab, then check the Subscription Summary. This lists details about each subscription, including the number of licenses and their expiration date. To view your subscription history: 1 On the My Account page, in the Subscription Summary section, select View subscription history. The Subscription History page lists details for each service subscription. 2 Select View Cancelled Subscriptions to display a list of subscriptions that are no longer current.

Update subscription information

Use the Subscription History page to update the contact and account information for each of your protection service subscriptions. This is useful for administrators who manage multiple accounts.

Your service provider determines whether this feature is available to you. Typically, the Edit link is available only to McAfee partners who oversee security for multiple accounts.

Note

To update information for a subscription: 1 On the My Account page, in the Subscription Summary section, select View subscription history. The Subscription History page lists details for each service subscription. 2 In the listing, select Edit for the subscription you want to update. 3 In the Edit Subscription Information page, type new information for: Email address Company name First name Last name 4 Click Submit to return to the Subscription History page and view the updated entry.

90

Total Protection Service Product Guide

Using Total Protection Service

Managing your subscriptions

3

Purchase, add, and renew services

Note

Information in this section does not pertain to pre-installed or CD-based versions of Total Protection Service. See Using pre-installed and CD versions on page 49 for information about those versions.

To ensure that additional or renewed services remain on the same account with your existing services, follow these guidelines: Submit your order through the same SecurityCenter website you use to maintain your original subscriptions. Submit your order with the same email address you use to log in to the SecurityCenter. By keeping all your service subscriptions on the same account, all your client computers report to the same SecurityCenter website, and your service provider sends all correspondence and notifications to one email address. If you do purchase subscriptions on multiple accounts, you can merge them into a single account (see Merge another account into your account on page 92). To purchase, add, or renew services: 1 On the My Account page, locate the Subscription Summary section. 2 In the Add Service column, click Buy, Buy More, or Renew. 3 Follow the instructions on the Product Purchase page.

You can also access the Product Purchase page from the SecurityCenter page or the Subscription History page.

Note

Request a trial subscription

To try a protection service free of charge for 30 days, you can request a trial subscription. You'll have the opportunity to try all the features. You can then purchase the service and continue using it with no interruption in protection. To request a free trial: 1 On the My Account page or the SecurityCenter page, click Buy or Try. 2 Follow the instructions on the Product Purchase page.

Receive subscription notifications

Configure your notification preferences to receive an email whenever the expiration date for a service approaches. See Sign up for email notifications on page 67 for more information.

91

Total Protection Service Product Guide

Using Total Protection Service

Getting assistance

3

Merge another account into your account

Use this feature to merge other installations of Total Protection Service into your account. This is useful when Total Protection Service has been installed using another license key or administrator's email address. For example, if you set up Account 1, then order additional licenses and activate them to a different email address than the one you originally used, the new licenses appear in Account 2. To view all the computers and licenses under Account 1, you must merge Account 2 into Account 1. Once they are merged, Account 2 no longer exists. All the computers and licenses formerly listed under Account 2 are listed in the SecurityCenter for Account 1. To merge accounts: 1 On the My Account page, under Manage Accounts click Merge another account. 2 On the Step 1 page, enter the email address and password activated for the account you want to merge into your main account, then click Next. 3 On the Step 2 page, view details for the account you have selected. Verify that the licenses and computers listed for the account are the ones you want to merge. 4 On the Step 3 page, click Merge Account.

Getting assistance

Click the Help tab to display the Help page, where you can access additional resources for Total Protection Service and your SecurityCenter website. View printed and online documents Download utilities Contact product support View demos and tutorials

View printed and online documents

Several documents are available to assist you with installing, configuring, and using your protection services. To view online documents: On the Help page, click a link for this Product Guide, the Quick Start Guide, or the Release Notes. To view context-sensitive online help: Click the help link ( ? ) at the upper right of any page of the SecurityCenter to view information specific for that page.

92

Total Protection Service Product Guide

Using Total Protection Service

Getting assistance

3

Download utilities

Access utilities to assist with installing client software and troubleshooting installation problems from the Utilities page. To download utilities: On the Help page, click Utilities, then click a link.

To do this... Silently install client software on individual client computers. Click this link...

VSSetup

Downloads the silent installation package for deploying client software to a single computer without user interaction. Download to the administrative computer. Requires a method for moving the installation package to a client computer, such as a third-party deployment tool, a login script, a link to an executable file in an email message, or a portable medium such as a CD. See Silent installation on page 41 for more information.

Install client software remotely using the Push Install utility.

Run the Push Install Utility

Downloads a utility for remotely deploying client software directly from your service provider's website to multiple computers simultaneously. Download to the administrative computer. See Push installation on page 44 for more information.

Uninstall components left from a previous installation.

MVSUninstall

Downloads a utility that cleans up registry keys and files from a previous installation of Total Protection Service or competitive software. Download directly to the client computer, then double-click.

Enable users without administrator rights to install client software.

installation agent

Downloads the standalone installation agent. Download directly to the client computer and install locally, or download to the administrative computer and use deployment tools to install on clients. Required only when you want users without administrator rights to use the URL method to install client software. You must have local administrator rights on the client computer to install this file. See Install the standalone installation agent on page 36 for more information.

Contact product support

If you cannot find an answer to a question in the product documentation, send it directly to a product support representative. To contact product support: On the Help page, click Contact Support to display a form where you can submit a description of your problem to a product support representative.

93

Total Protection Service Product Guide

Using Total Protection Service

Recommendation for managing large accounts

3

View demos and tutorials

Access multimedia presentations to help you better understand how to install and use Total Protection Service. These presentations do include audio, so please adjust the volume on your computer before viewing them. To view an online demo or tutorial: On the Help page or the login window, click one of the icons.

Click this icon... To open this presentation... An overview of how Total Protection Service works to protect the computers on your network. Step-by-step instructions for installing Total Protection Service by using a download URL. Instructions for using the SecurityCenter administrative website to manage your account.

View the Total Protection Service Demo View the Installation Tutorial View the SecurityCenter Demo

Recommendation for managing large accounts

To more efficiently manage large accounts, we recommend: Organize your computers into groups. This enables you to use the View filter to display all your computers by groups, which optimizes SecurityCenter performance and allows you to more quickly check status for large numbers of computers. Then click a group name to view and manage security issues for individual computers within the group.

94

4

Using the Virus and Spyware Protection Service

The virus and spyware protection service in Total Protection Service safeguards client computers against threats, such as viruses and potentially unwanted programs, by scanning files and email messages as they are accessed. This section describes features of the virus and spyware protection service: Accessing client features (Scan Tasks menu) Scanning client computers Configuring policies for virus and spyware protection Viewing reports for virus and spyware detections Managing detections Disabling on-access scanning

Accessing client features (Scan Tasks menu)

Use the Scan Tasks menu to access client features of the virus and spyware protection service. You can also access advanced features from an administrative version of the menu. To display the Scan Tasks menu: On the client computer, click in the system tray, then select Scan Tasks. OR To display the administrative version of the menu, hold down Ctrl and Shift, click the system tray, then select Scan Tasks. in

95

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Accessing client features (Scan Tasks menu)

4

Figure 4-1 Scan Tasks menu

Select this command...

To do this... Select a location to scan (My Computer, My Documents Folder, or Floppy A). Click Scan Folder... to browse to a folder of your choice. Open the quarantine folder, which contains possible threats detected on the computer (see Manage quarantined files on page 117). Display a list of potentially unwanted programs that the virus and spyware protection service has detected (see Scan for spyware on page 101). Turn off the automatic on-access scanner. To re-enable the scanner, reopen the administrative menu and select Enable On-Access Scanner (see Disabling on-access scanning on page 118). Note: The computer is vulnerable to attack if you disable the on-access scanning feature. Be sure to enable the feature again as soon as possible.

Scan...

Quarantine Viewer

(administrative menu only)

View PUP Detections

Disable On-Access Scanner

(administrative menu only)

96

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Scanning client computers

4

Scanning client computers

The virus and spyware protection service safeguards computers by automatically scanning for viruses and spyware. At any time, users can perform manual scans of files, folders, or email, and administrators can set up scheduled scans. Scan automatically (on-access scans) Scan manually (on-demand scans) Schedule on-demand scans Scan email Scan for spyware The behavior of the scanning features on client computers is defined in the policies that you configure using the SecurityCenter. Policy settings determine the types of files, programs, and other items detected; whether users can manage their detections; how frequently computers check for updates; and when scheduled scans occur. See Configuring policies for virus and spyware protection on page 103 for instructions on configuring these settings in policies.

Scan automatically (on-access scans)

The virus and spyware protection service scans files and folders on client computers whenever they are accessed, which is referred to as an on-access scan. The default on-access scanning policy is: All types of files are scanned when opened, and again when closed (if they were modified). All email attachments are scanned when accessed and when saved to the hard drive, protecting the computer from email infections. Programs are scanned for spyware identifiers, to detect if a spyware program attempts to run or a program attempts to install spyware. To customize on-access scans, administrators can: Exclude certain folders, file types, or programs from on-access scanning by configuring the virus and spyware protection settings in policies (see Specify approved programs on page 109). Select an option to scan only files meeting the current file extension criteria specified in the detection definition (DAT) files (see Set advanced virus protection options on page 105). Select an option to scan compressed archives (see Set advanced virus protection options on page 105). Specify other options for scanning email attachments and spyware (see Configuring policies for virus and spyware protection on page 103).

97

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Scanning client computers

4

Scan manually (on-demand scans)

The virus and spyware protection service automatically scans most files when they are accessed. However, users can scan a particular drive or folder at any time. This is referred to as an on-demand scan. The default on-demand scanning policy is: All processes running in memory are scanned. All files are scanned. All critical registry keys are scanned. In addition, during an on-demand scan of My Computer, the drive where Windows is installed, or the Windows folder: All cookies are scanned. All registry keys are scanned. Administrators can set a schedule for some or all computers to run an on-demand scan automatically. See Schedule on-demand scans on page 104 for more information. To perform a manual scan using the icon: 1 Click in the system tray, then select Scan Tasks. 2 Select Scan My Computer, Scan My Documents Folder, or Scan Floppy A:, or select Scan Folder and browse for a drive or folder. To perform a manual scan from Windows Explorer: In Windows Explorer, click any drive or folder, then select Scan Now from the menu.

Figure 4-2 Scan Now option

98

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Scanning client computers

4

View scan results

After completing an on-demand scan, Total Protection Service stores results in a Scan Statistics report on the computer where the scan was performed. The number and type of detections are uploaded to the SecurityCenter for inclusion in administrative reports. To view results of a manual scan: In the Scan Completed dialog box, click Report to display the Scan Statistics report. What is in a Scan Statistics report? The Scan Statistics report opens in the default browser and displays the following information: Date and time the scan was started. Elapsed time for the scan. Version of the scanning engine software and DAT file. Date of the last update. Completion status of the scan. Location of the scanned items. Status for scanned files, registry keys, and cookies:

Scanned Detected

Number of items scanned. The item is still a threat and still resides on the system. For files, they are most likely contained within a compressed archive (for example, a .ZIP archive) or on write-protected media. For registry keys and cookies, the file it is associated with has a status of Detected. The item was cleaned of the threat. A backup copy of the original item was saved in a quarantine folder, in a proprietary binary format, where it can be accessed only with the Quarantine Viewer (see Manage quarantined files on page 117). The item could not be cleaned; it was deleted instead. A copy was saved in a quarantine folder, in a proprietary binary format, where it can be accessed only with the Quarantine Viewer (see Manage quarantined files on page 117).

Cleaned

Deleted

99

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Scanning client computers

4

How detections are handled

The type of threat and the policy settings determine how the virus and spyware protection service handles a detection:

Items with detections Files and programs How the service handles the detections Virus detections: The virus and spyware protection service attempts to clean the file. If it can be cleaned, the user is not interrupted with an alert. If it cannot be cleaned, an alert appears, and the detected file is deleted. A copy is placed in the quarantine folder. Potentially unwanted program detections: If the virus and spyware protection service is set to Protect mode, detections are cleaned or deleted. If set to Prompt mode, users must select the response. See Select a spyware protection mode on page 108 for details. In all cases, a backup copy of the original item is saved in a quarantine folder, in a proprietary binary format (see Manage quarantined files on page 117). Data for all activity is uploaded to the SecurityCenter for use in reports. Registry keys and cookies Detections initially appear as Detected. See Scan for spyware on page 101 for instructions on cleaning the detections. Cleaning detected files also cleans their associated registry keys and cookies. Their status is then reported as Cleaned.

Schedule on-demand scans

Schedule an on-demand scan to occur at a specific date and time, either once or on a recurring basis. For example, you might want to scan client computers at 11:00 P.M. each Saturday, when it is unlikely to interfere with other client processes. Scheduled scans are configured as part of a policy and run on all computers using that policy. See Schedule on-demand scans on page 104.

At the start of an on-demand scan, all previous detections of potentially unwanted programs are cleared from the Potentially Unwanted Program Viewer.

Note

Scan email

By default, the virus and spyware protection service scans all email messages and attached files as they are accessed. It also scans messages before they reach a user's Inbox (see Enable optional protection on page 106). Users can scan their Microsoft Outlook folders or individual messages manually. To scan an email message manually: 1 In the Microsoft Outlook Inbox, highlight one or more messages in the right pane. 2 Under Tools, select Scan for Threats. The On Demand Email Scan window displays any detections. If the window is empty, no threats were detected.

100

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Scanning client computers

4

Scan for spyware

As part of its automatic scans, the virus and spyware protection service scans for spyware whenever programs are installed or run, and during manual scans. Its response to detections depends on the spyware mode configured in the client computer's policy (see Set basic spyware protection options on page 107). Three responses are possible: Attempt to clean the program (Protect mode). Prompt the user for a response (Prompt mode). Log the detection and take no further action (Report mode). Cookies and registry keys that indicate spyware are also detected. Deleting a potentially unwanted program deletes any associated cookies and registry keys. All detections are listed in administrative reports available from the SecurityCenter. On client computers, you can view and manage detections using the Potentially Unwanted Program Viewer.

At the start of an on-demand scan, all previous detections of potentially unwanted programs are cleared from the Potentially Unwanted Program Viewer. For on-access scans, previous detections remain in the Potentially Unwanted Program Viewer.

Note

To manage spyware detections on client computers: 1 On the client computer, open the Potentially Unwanted Programs Viewer. Either: In the Detection Alert dialog box, click Yes. Click in the system tray, then select Scan Tasks | View PUP Detections.

The Potentially Unwanted Program Viewer lists each detected program. 2 Select one or more detections, then select an action:

Clean

Place an original copy of each selected item in a quarantine folder, in a proprietary binary format, then attempt to clean it. If it cannot be cleaned, delete the item. Add each selected item to the user's list of approved programs. These programs will not be detected as spyware during future scans. (Clicking Approved displays a list of all currently approved programs on the client computer.) Allow the items to remain on the computer and close the Potentially Unwanted Program Viewer. They will be detected again during the next scan.

Approve

Close

101

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Scanning client computers

4

3 Check the status of each item, then click Close.

Action Required Approved Cleaned

You have not performed any action on this item since it was detected. The item was added to the list of user-approved programs and will no longer be detected as spyware on this computer. The item was cleaned successfully and can be used safely. A backup copy of the original item was placed in a quarantine folder in a proprietary binary format. The item could not be cleaned. The original item was deleted, and a copy was placed in a quarantine folder in a proprietary binary format. If the item was a program, all associated cookies and registry keys were also deleted. Note: Items are placed into the quarantine folder in a format that is no longer a threat to the computer. After 30 days, these items are deleted. You can manage these items using the Quarantine Viewer (see Manage quarantined files on page 117).

Quarantined

Delete failed

The item could not be cleaned or deleted. If it is in use, close it and attempt the clean again. If it resides on read-only media, such as CD, no further action is required. The virus and spyware protection service has prevented the original item from accessing the computer, but it cannot delete the item. Any items copied to the computer have been cleaned. Note: If you are not sure why the item could not be cleaned, it is possible that a risk still exists. If you cannot determine why the delete failed, contact product support.

102

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Configuring policies for virus and spyware protection

Policies define the operational settings for all your protection services. See Setting up policies on page 81 for general information about using policies. Three tabs are used to configure basic and advanced features for virus and spyware protection. Set basic virus protection options Set advanced virus protection options Set basic spyware protection options Set advanced spyware protection options When you first create a new policy, it is prepopulated with the settings of the McAfee Default policy. See The McAfee Default policy on page 82 for a list of the virus and spyware protection settings in the McAfee Default policy.

Set basic virus protection options

On the Groups + Policies page, use the Virus Protection tab to configure basic settings for virus protection. Schedule on-demand scans Exclude files and folders from virus scans

Figure 4-3 Virus Protection policy tab

103

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Schedule on-demand scans

You can force a computer to scan all files, folders, and programs by scheduling an on-demand scan to occur at a specific date and time, once or on a recurring basis. These scans are performed in addition to the regular on-access scans. To schedule an on-demand scan: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Virus Protection tab. 3 Under On-Demand Scan, click On. 4 Select a frequency, day, and time for the scan to run, then click Save.

Exclude files and folders from virus scans

You can create a custom list of files, paths, and file extensions to exclude from both on-access and on-demand scans for viruses. By selecting a file here, you request that it not be scanned for viruses.

You can exclude a particular type of file you know is not vulnerable to attack or a folder you know is safe. If you are unsure, we recommend not setting exclusions.

Tip

To specify exclusions: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Virus Protection tab. 3 Under Excluded Files and Folders, select the type of exclusion you want to create. 4 Specify the value (browse for a file or folder, or type a file extension). 5 Click Add Exclusion. The new exclusion appears in a list. 6 Click Save. To remove an exclusion from the list: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Virus Protection tab. 3 Under Excluded Files and Folders, in the table listing for the exclusion you want to remove, click Block, then click Save.

104

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Set advanced virus protection options

On the Groups + Policies page, use the Advanced Settings tab to configure enhanced protection and safeguard against additional threats lurking in out-of-the-way locations. Select your update frequency Enable optional protection

See Update computers where no user is logged on on page 60 for information about the Update client computers where users are not logged in policy setting.

Note

Figure 4-4 Advanced virus protection policy settings

Select your update frequency

By default, computers check for updates every 12 hours. You can specify that they check as often as every four hours or as infrequently as once a day.

An update is not necessarily downloaded every time the computer checks for updates. Checking can reveal that no new update is available.

Note

To select an update frequency: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Advanced Settings tab. 3 For Check for updates every, select a setting, then click Save.

105

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Enable optional protection

Specify additional updates and advanced scanning to increase protection on client computers. To specify optional scans: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Advanced Settings tab, select each scan you want to enable, then click Save.

Enable outbreak response Enable buffer overflow protection

Check for an outbreak DAT file every hour. Detect code starting to run from data in reserved memory and prevent that code from running. This feature protects against buffer overflow in more than 30 most commonly used Windows-based programs. McAfee updates this list as it adds buffer overflow protection for additional programs. Important: Buffer overflow protection does not stop data from being written. Do not rely on the exploited application remaining stable after being compromised, even if buffer overflow protection stops the corrupted code from running.

Enable script scanning Scan email (before delivering to the Outlook Inbox) Scan all file types during on-access scans Scan within archives during on-access scans (e.g., .zip, .rar, .tat, .tgz) Scan within archives during on-demand scans (e.g., .zip, .rar, .tat, .tgz)

Detect harmful code embedded in web pages that could cause unauthorized programs to run on client computers. Detect viruses and harmful code in email messages before they are placed in the user's Inbox.

Inspect all types of files, instead of only default types, when they are downloaded, opened, or run. (Default file types are defined in the DAT files.) Detect viruses and harmful code in compressed archive files (such as .ZIP files) during on-demand scheduled or Scan Now scans. Detect viruses and harmful code in compressed archive files (such as .ZIP files) as they are saved, uncompressed, or opened.

Note

With the default settings, it is possible for an on-demand scan to detect threats in archived files that are not detected during an on-access scan. This is because on-access scans do not look at compressed archives by default. If this is a concern for your organization, you should enable this option.

106

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Set basic spyware protection options

On the Groups + Policies page, use the Spyware Protection tab to configure basic settings for spyware protection. Enable spyware protection Select a spyware protection mode Specify approved programs

Figure 4-5 Spyware Protection policy tab

Enable spyware protection

You can specify whether the virus and spyware protection service looks for spyware and other potentially unwanted programs during scans. By default, this option is enabled. To enable and disable spyware protection: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Spyware Protection tab. 3 For Spyware Protection Status, select On or Off, then click Save.

107

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Select a spyware protection mode

You can specify how the virus and spyware protection service responds to detections of potentially unwanted programs on client computers.

Protect: It attempts to clean the detected item. If the item cannot be cleaned, a copy

of the item is placed in a quarantine folder and the original item is deleted.

Prompt: It displays a dialog box with information about the detection, and allows the

user to select a course of action. This option is the default.

Report: It reports detections to the SecurityCenter and takes no additional action.

For all modes, detections are reported to the SecurityCenter, where you can view information about them in reports.

To prevent popup prompts from appearing on client computers when threats are detected, and for highest security, we recommend using Protect mode.

Tip

To specify a response to potentially unwanted program detections: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Spyware Protection tab, select a Spyware Protection Mode, then click Save. Use the following table to determine how policy options are implemented in the different protection modes.

Mode Report Behavior of protection service No user prompts. Detections reported to SecurityCenter. Administrator can select approved programs, which are not reported as detections. Can be used as a Learn mode. Prompt Users prompted about detections. Detections reported to SecurityCenter. Administrator can select approved programs. These programs are not reported as detections, and users are not prompted for a response to them. Users can approve additional programs in response to prompts. These are reported to SecurityCenter. Protect Users not prompted about detections. Users notified about deleted or quarantined programs. Detections reported to SecurityCenter. Administrator can select approved programs. These programs are not reported as detections.

Note

If the policy is changed from Prompt mode to Protect mode or Report mode, the virus and spyware protection service saves user settings for approved programs. If the policy is then changed back to Prompt mode, these settings are reinstated.

108

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Learn mode

Report mode can be used as a "learn mode" to help you determine which programs to approve (see Specify approved programs on page 109). In Report mode, the virus and

spyware protection service tracks but does not delete unrecognized programs. You can review detected programs in the Unrecognized Programs report (see View unrecognized programs on page 113) and approve those that are appropriate for your policy. When you no longer see programs you want to approve in the report, change the policy setting to Prompt or Protect mode.

Specify approved programs

On client computers, the virus and spyware protection service maintains a list of approved programs that are not identified as potentially unwanted programs. You can configure the list of approved programs for all computers using a policy. In addition, users can approve programs for individual client computers when the firewall protection service is set to Prompt mode.

Approve only programs you know are safe. If you are unsure about a program, we recommend not adding it to the approved programs list.

Caution

To configure approved programs in a policy: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Spyware Protection tab. 3 Under Approved Programs, locate the program you want to approve in the listing of all programs detected on client computers. 4 Click Approve, then click Save. OR Click Approve All to approve all the programs listed, then click Save. The status of each approved program changes to Approved.

You can also use the Unrecognized Programs report to view a complete listing of all programs detected on client computers and add them to policies (see View unrecognized programs on page 113).

Tip

To remove an approved program from a policy: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Spyware Protection tab. 3 In the list of Approved Programs, click Block for each program you want to delete from the policy, then click Save. OR

109

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Configuring policies for virus and spyware protection

4

Click Block All to block all the programs listed, then click Save.

If users have approved a program to run on their computers (by responding to a detection prompt), this does not override their approval. The program will still be allowed to run on their computers. To prevent users from approving programs, select a protection mode of Protect (see Select a spyware protection mode on page 108).

Note

Set advanced spyware protection options

On the Groups + Policies page, use the Advanced Settings tab to select the types of potentially unwanted programs to search for during scans.

Threat type Description Programs designed to be mistaken for a virus. They might alarm or annoy a user but do not harm files or data. They are intended to waste time and resources. Programs that can be used from a remote location to access a computer. Some remote administration tools serve useful purposes, such as allowing users to access their files from home, but others can be used by unauthorized persons to monitor user activities and take control of a computer. Programs that covertly gather user information through the user's Internet connection without the user's knowledge. Once installed, spyware monitors user activity on the Internet and transmits that information in the background to someone else. Spyware can gather information such as email addresses, websites visited, passwords, and credit card numbers. Programs that hijack a user's modem and dial premium-rate phone numbers, such as those required to access pornographic websites. Programs that find passwords or encryption keys by trying every possible combination of characters until the code is broken. Programs that display unsolicited advertisements. Adware often includes code that tracks a user's personal information and transmits it to someone else, without the user's knowledge. Programs such as viruses, worms, and Trojan horses that perform some unauthorized (and often harmful or undesirable) act. Programs that record every keystroke a user makes. They can be used to steal passwords and other confidential information.

Jokes

Remote admin tools

Spyware

Dialers Password crackers Adware

Potentially unwanted programs Key loggers

To specify programs to detect: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Advanced Settings tab. 3 Select each type of program you want to detect, then click Save.

110

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Viewing reports for virus and spyware detections

4

Viewing reports for virus and spyware detections

Whenever a client computer checks for updates, it also sends data to the SecurityCenter in encrypted XML files. You can view this data in reports accessed from the Reports page. Three reports contain information about virus or spyware detections:

Detections (see View detections). Unrecognized Programs (see View unrecognized programs on page 113). Detection History (see View your detection history on page 115).

View detections

Use the Detections report to view and manage the types of potentially malicious code or unwanted programs that have been found on your network.

Specify the types of unwanted programs the virus and spyware protection service will detect in a policy (see Set advanced spyware protection options on page 110).

Note

Figure 4-6 Detections report

111

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Viewing reports for virus and spyware detections

4

Select the information that appears in this report: View -- List the computers where detections occurred, the name of detections , or the groups containing computers where detections occurred.

Groups -- Display only the computers in a single group or display all computers in the account. (Not available when View | Groups is selected.) Report period -- Specify the length of time for which to display information. Detection type -- Show all threat detections or a particular type: Malware Infections Potentially Unwanted Programs

Known threats that would infect your computer if they were not caught. Programs that you defined as unwanted. Configure the types of programs on the Advanced Settings tab (see Set advanced spyware protection options on page 110). Unwanted code that attempted to run in reserved memory but was stopped. A data file containing personal information that is created by a web server and stored on your computer. Cookies allow web servers to recognize you and track your preferences when you visit Internet sites.

Buffer Overflow Processes Cookies

Using the Detections report

When you want to... Display computers or detections Do this...

Click

next to a name:

Under a computer name, show which detections were found. Under a detection name, show the computers where it was found. Click a group name to display computers in that group View details about detections If detections are listed for a computer, click a quantity to display details. 1 On the Detections report, click a quantity for Detected Objects to display a list of detected threats and their status. 2 From the Detection List, click the name of a detection to display detailed information from the McAfee Avert Labs Threat Library. View details about a computer where a detection occurred On the Detections report, click a computer name to display the Computer Details page. The Computer Details page displays information about the computer, its service components, and its detections (see Display details for a computer on page 72).

112

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Viewing reports for virus and spyware detections

4

View unrecognized programs

Use the Unrecognized Programs report to view a list of unapproved programs that the spyware protection service or firewall protection service detected on your network.

Figure 4-7 Unrecognized Programs report

Select the information that appears in this report: View -- List the computers where unrecognized programs were detected, the name of the programs, or the groups containing computers where unrecognized programs were detected.

Groups -- Display only the computers in a single group or display all computers in the account. (Not available when View | Groups is selected.) Report period -- Specify the length of time for which to display information. Program type -- Show all unrecognized programs, only programs blocked by the firewall protection service, only potentially unwanted programs, or only cookies.

113

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Viewing reports for virus and spyware detections

4

Using the Unrecognized Programs report

When you want to... Display computers or detections Do this...

Click

next to a name:

Under a computer name, show which programs were detected. Under a program name, show the computers where it was detected. Click a group name to display computers in that group. View details about detections View details about a computer where a detection occurred On the Unrecognized Programs report, click the name of a potentially unwanted program to display detailed information from the McAfee Avert Labs Threat Library. On the Unrecognized Programs report, click a computer name to display the Computer Details page. The Computer Details page displays information about the computer, its service components, and its detections (see Display details for a computer on page 72). Click Allow, select one or more policies, then click OK. Approved programs will no longer be detected as a threat by the virus and spyware protection service on computers using the selected policies.

Approve a program

114

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Viewing reports for virus and spyware detections

4

View your detection history

Check the Detection History report for a graphical overview of the number of detections and the number of computers where detections occurred over the past year on your network. This information can help you determine how successfully your protection services have performed, and whether strategies you have implemented such as user education or policy adjustments have been effective.

Figure 4-8 Detection History report

Select the information that appears in this report: Groups -- Display only the computers in a group or display all computers.

Display by -- Display information for the last year in monthly or quarterly increments.

115

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Managing detections

4

Managing detections

To effectively manage your strategy for virus and spyware protection, we recommend that you proactively track the types of threats being detected and where they are occurring. Manage your protection strategy with best practices Manage quarantined files Manage potentially unwanted program detections (see Scan for spyware on page 101)

Manage your protection strategy with best practices

1 Check your status emails or the SecurityCenter website for an overview of your account's status. (See Sign up for email notifications on page 67 to request status emails.) Ensure that your computers are up-to-date. Ensure that protection services are installed on all computers. 2 Check the Detections report regularly to see what is being detected (see View detections on page 111). 3 Check the Unrecognized Programs report frequently to monitor the programs that users are allowing on client computers (see View unrecognized programs on page 113). If you know some of the programs are safe and do not want them to be detected as potentially unwanted, add them to policies (see Specify approved programs on page 109). 4 To centralize management and more easily monitor the types of programs allowed on client computers, define client security settings in a policy. 5 If particular types of detections are occurring frequently or certain computers appear vulnerable, update the policy to resolve these issues. Schedule scans or add exclusions (see Set basic virus protection options on page 103). Enable advanced scanning options (see Set advanced virus protection options on page 105). Ensure that spyware protection is enabled (see Set basic spyware protection options on page 107). For maximum protection, set your spyware protection to Protect mode to automatically clean potentially unwanted programs (see Set basic spyware protection options on page 107).

Protect mode is not the default setting. For maximum protection, create a policy that includes Protect mode.

Note

Enable all advanced spyware options (see Set advanced spyware protection options on page 110).

116

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Managing detections

4

6 Use "learn" mode to identify which programs to add to the Approved Programs list, (see Learn mode on page 109). This ensures that no required programs are deleted before you have the opportunity to authorize their use. Then change your protection mode to Protect. 7 View the Detection History report periodically to discover trends specific to your network, and verify your strategy's success in reducing detections.

Manage quarantined files

When the virus and spyware protection service detects a threat on a client computer, it attempts to clean the item where the threat is detected. The item might be a file, cookie, or registry key. If it cannot clean the item, it deletes the original item and places a copy in a quarantine folder in a proprietary binary format. If it can clean the item, it places a copy of the original detected item in a quarantine folder in a proprietary binary format. This copy serves as a backup. Once quarantined, these items pose no threat to client computers. It is not necessary to view or delete them, but you might occasionally want to do so. In these situations, you must view the files on the client computer using the Quarantine Viewer.

Files are placed into the Quarantine Viewer in a format that is no longer a threat to the client computer. After 30 days, these files are deleted. Only users with administrator rights can access the Quarantine Viewer.

Note

To check quarantined files: 1 On the client computer, hold down the Ctrl and Shift keys and click tray. 2 Select Scan Tasks | Quarantine Viewer.

in the system

The Quarantine Viewer lists all the items in the quarantine folder and their status. 3 Select one or more items, then click an action:

Rescan

Scan each selected item again. This option is useful when new detection definition (DAT) files include a method of cleaning a detection that could not be cleaned previously. In this case, rescanning the file cleans it and allows you to restore it for normal use. Place each selected item back in its original location on the computer. The restored item will overwrite any other items with the same name in that location. Note: The virus and spyware protection service detected this item because it considers the item to be a threat. Do not restore the item unless you are sure it is safe.

Restore

Delete

Remove each selected item from the quarantine folder, along with all associated registry keys and cookies. No copy will remain on the computer.

117

Total Protection Service Product Guide

Using the Virus and Spyware Protection Service

Disabling on-access scanning

4

4 Check the status of each item:

Cleaned Clean failed Delete failed

The rescan action was successful. You can safely restore the item. The item cannot be cleaned. The item cannot be cleaned or deleted. If it is in use, close it and attempt the clean again. If it resides on read-only media, such as CD, no further action is required. The virus and spyware protection service has prevented the original item from accessing the computer, but it cannot delete the item. Any items copied to the computer have been cleaned. Note: If you are not sure why the item could not be cleaned, it is possible that a risk still exists.

Quarantined

You have not performed any action on this item since it was placed in the quarantine folder.

5 Click OK to close the Quarantine Viewer.

Disabling on-access scanning

Temporarily disabling the automatic on-access scanner on client computers can be useful when working with product support to troubleshoot issues with scanning and cleaning files.

The computer is vulnerable to attack if you disable the on-access scanning feature. Be sure to enable the feature again as soon as possible.

Caution

To disable and enable on-access scans: 1 On the client computer, hold down the Ctrl and Shift keys and click tray. 2 Select Disable On-Access Scanner or Enable On-Access Scanner.

in the system

Note

Only on-access scanning is disabled. Buffer overflow protection continues to function. To disable buffer overflow protection, you must update the policy (see Set advanced virus protection options on page 105).

118

5

Using the Firewall Protection Service

The firewall protection service in Total Protection Service safeguards against intrusions by monitoring inbound and outbound communications on client computers. It checks: IP addresses and communication ports that attempt to communicate with your computer. Applications that attempt to access the Internet. As the administrator, you can define what constitutes suspicious activity and the firewall protection service's response. You can specify specific IP addresses, reports, and applications to allow or to block. By defining firewall protection settings in a policy, you can centrally manage the firewall protection service for your organization. If you prefer a more hands-off approach, you can allow users to decide which communications and applications the firewall protection service allows. This section describes these features of the firewall protection service: Accessing client features (Firewall Settings command) Configuring policies for firewall protection Viewing reports for firewall protection Managing suspicious activity with best practices

Accessing client features (Firewall Settings command)

Use the client menu to access client features of the firewall protection service. To display firewall settings: On client computers, click in the system tray and select Firewall Settings: On computers where the policy does not allow users to configure settings, a summary of current settings is displayed. On computers where the policy does allow users to configure settings, a dialog box with configuration options is displayed. Client procedures for configuring firewall settings are documented in the User Help on the client computer.

119

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Configuring policies for firewall protection

Policies define the operational settings for all your protection services. See Setting up policies on page 81 for general information about using policies. By default, users configure their own firewall protection settings. When you set up a policy, you can specify whether to allow users to change their settings.

For maximum protection, we recommend that you configure firewall protection settings. If users change their settings, we recommend that you review their changes regularly. It is important that mobile users who connect to both secure (trusted) and unsecure (untrusted) networks be able to update the settings as their location changes.

Note

When you create a policy that specifies the administrator configures firewall protection settings, it is prepopulated with the settings of the McAfee Default policy. See The McAfee Default policy on page 82 for a list of the firewall protection settings in the McAfee Default policy. On the Groups + Policies page, use the Desktop Firewall tab to configure basic settings for the firewall protection service. Specify who configures firewall protection settings Install the firewall protection service via policy Enable firewall protection Select a firewall protection mode Specify a connection type Enable tracking of blocked events Set up allowed Internet applications Specify whether to use McAfee recommendations

120

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Figure 5-1 Desktop Firewall policy tab (without Allowed Internet Applications)

Specify who configures firewall protection settings

Configuring settings for the firewall protection service enables you to control which applications and communications are allowed on your network. It provides the means for you to ensure the highest level of security. You can also allow users to configure their own firewall protection settings. In this case, no other options are available on this tab for you to select. To specify who configures firewall settings: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Firewall Configuration, select Administrator configures firewall or User configures firewall, then click Save.

To ensure the highest level of security, we recommend that administrators configure firewall protection. If you allow users to configure the settings, it is important to educate them about threats and strategies for avoiding intrusions.

Tip

121

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

How do user settings and administrator settings coexist? When you select Administrator configures firewall, any firewall settings that users have configured on their computers are saved. If you also select Prompt mode, user settings are merged with your policy settings on each client computer. When they differ, user settings take precedence over administrator settings. If you select Protect mode or Report mode, user settings become inactive. Saved settings configured by users become active again only when you reconfigure the policy for Prompt mode or User configures firewall.

Install the firewall protection service via policy

Use this option to install the firewall protection service automatically whenever client computers check for an updated policy. You might want to use this feature for adding the firewall protection service on computers where the Total Protection Service client software is already installed. By default, this option is disabled.

Enabling this feature can result in unattended installations on computers where no one is available to authorize communications that are consequently blocked by the firewall. If this feature is used to install the firewall protection service on a server, it is important to configure essential system services first, to prevent disruptions.

Caution

To install the firewall protection service via policy: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Firewall Configuration, select Automatically install the desktop firewall on all computers using this policy, then click Save.

Enable firewall protection

Specify whether the firewall protection service monitors inbound communications and Internet applications. By default, this feature is enabled. To enable the firewall protection service: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Firewall Status, select On, then click Save.

122

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Select a firewall protection mode

Specify how the firewall protection service responds to suspicious activity on client computers.

Protect: It blocks the suspicious activity. Prompt: It displays a dialog box with information about the detection, and allows the

user to select a response. This option is the default.

Report: It reports suspicious activity to the SecurityCenter and takes no additional

action. For all modes, detections are reported to the SecurityCenter, where you can view information about them in reports.

To prevent popup prompts from appearing on client computers when applications are detected, and for highest security, we recommend using Protect mode.

Tip

To specify a response to firewall detections: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab, select a Firewall Protection Mode, then click Save. Use the following table to determine how policy options are implemented in the different protection modes.

Mode Report Behavior of protection service No user prompts. Detections reported to SecurityCenter. Administrator can select allowed applications, which are not reported as detections. Can be used as a Learn mode. Prompt Users prompted about detections. Detections reported to SecurityCenter. Administrator can select allowed applications. These applications are not reported as detections, and users are not prompted for a response to them. Users can approve additional applications in response to prompts. These are reported to SecurityCenter. Protect Users not prompted about detections. Users notified about deleted or quarantined applications. Detections reported to SecurityCenter. Administrator can select allowed applications. These applications are not reported as detections.

Note

If the policy is changed from Prompt mode to Protect mode or Report mode, the firewall protection service saves user settings for allowed applications. If the policy is then changed back to Prompt mode, these settings are reinstated.

123

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Learn mode

Report mode can be used as a "learn mode" to help you determine which applications to allow (see Set up allowed Internet applications on page 129). In Report mode, the

firewall protection service tracks but does not block unrecognized Internet applications. You can review detected applications in the Unrecognized Programs report (see View unrecognized Internet applications on page 132) and approve those that are appropriate for your policy. When you no longer see applications you want to allow in the report, change the policy setting to Prompt or Protect mode.

Specify a connection type

The connection type defines the environment where client computers are used and determines which IP addresses and ports the firewall protection service allows to communicate with them. This option defines what the firewall protection service considers to be suspicious activity. The default setting is Untrusted.

For client computers used in multiple environments, it is important to update the connection type whenever the working environment changes. For example, mobile users who connect to both secure (trusted) and unsecure (untrusted) networks must be able to change their setting accordingly.

Caution

Select from three connection environments:

Select this... When the computer... Is connected directly to the Internet. For example: through a dial-up connection, a DSL line, or a cable modem; through any type of connection in a coffee shop, hotel, or airport. Then the firewall service... Blocks communications with all other computers, including those on the same subnet.

Untrusted

Trusted

Is connected indirectly to a network that is separated from the Internet by a hardware router or firewall. For example: in a home or office network.

Allows communications with other computers on the same subnet, but blocks all other network communications.

Custom

Should communicate only through specific ports or with a specific range of IP addresses, or the computer is a server providing system services. You also need to configure additional options (see Configure a custom connection on page 125).

Allows communications only with the ports and IP addresses you specify, and blocks all other network communications.

Note

This feature does not affect Internet applications running on client computers. To configure Internet applications, see Set up allowed Internet applications on page 129.

To specify a connection type: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab, select a Connection Type, then click Save.

124

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Configure a custom connection

Configure a custom connection type to designate: Ports through which your computer can receive communications. This is required to set up your computer as a server that provides system services. Your computer will accept communications through any open port from any computer. IP addresses from which your computer can receive communications. This allows you to limit communications to specific IP addresses. From the Firewall Custom Settings page, you can define exactly which communications the firewall protection service allows: Configure system services for a custom connection Configure IP addresses for a custom connection

Custom settings configured on the SecurityCenter are ignored on client computers if the Firewall Protection Mode is set to Prompt mode. In Prompt mode, settings configured by users override administrator settings.

Note

Configure system services for a custom connection

Certain applications, including web servers and file-sharing server programs, must accept unsolicited connections from other computers through designated system service ports. When configuring a custom operating mode, you can: Allow applications to act as servers on the local network or the Internet. Add or edit a port for a system service. Disable or remove a port for a system service.

Select a port for system services only if you are certain it must be open. You will rarely need to open a port. we recommend that you disable unused system services.

Caution

Examples of system services that typically require ports to be opened are: Email server -- You do not need to open a mail server port to receive email. You need to open a port only if the computer running the firewall protection service acts as an email server. Web server -- You do not need to open a web server port to run a web browser. You need to open a port only if the computer running the firewall protection service acts as a web server.

An opened service port that does not have an application running on it poses no security threat.

Note

This section explains the following concepts and tasks relevant to configuring service ports: Standard system service ports Open a service port Add and edit service ports Close a service port

125

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Standard system service ports

System services communicate through ports, which are logical network connections. Common Windows system services are typically associated with particular service ports, and your computer's operating system or other system applications might attempt to open them. Because these ports represent a potential source of intrusions into a client computer, you must open them before the computer can communicate through them. These commonly used standard service ports are listed by default on the Firewall Custom Settings page, where you can open or close them: File and Print Sharing Remote Desktop Remote Assistance You can add other service ports as needed. Standard service ports for typical system services are: File Transfer Protocol (FTP) Ports 20-21 Mail Server (IMAP) Port 143 Mail Server (POP3) Port 110 Mail Server (SMTP) Port 25 Microsoft Directory Server (MSFT DS) Port 445 Microsoft SQL Server (MSFT SQL) Port 1433 Remote Assistance / Terminal Server (RDP) Port 3389 (same as Remote Assistance and Remote Desktop) Remote Procedure Calls (RPC) Port 135 Secure Web Server (HTTPS) Port 443 Universal Plug and Play (UPNP) Port 5000 Web Server (HTTP) Port 80 Windows File Sharing (NETBIOS) Ports 137-139 (same as File and Print Sharing)

To ensure that a port is blocked, you must add it to this list and make sure it is deselected.

Caution

126

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Figure 5-2 Firewall Custom Settings page

Open a service port

Opening a system service port on a client computer allows it to act as a server on the local network or the Internet. To open a service port: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Connection Type, select Custom settings, then click edit. 4 On the Firewall Custom Settings page, select the checkbox next to the service port(s) you want to open, then click Save. Client computers using this policy will accept all communications through these ports. 5 On the Desktop Firewall tab, click Save.

Select a port in the Allowed Incoming Connections list only if you are sure it must be open.

Caution

Add and edit service ports

If a service port does not appear in the Allowed Incoming Connections list, you need to add it to the list manually. To add or edit a system service: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy).

127

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

2 Click the Desktop Firewall tab. 3 Under Connection Type, select Custom settings, then click edit. 4 On the Firewall Custom Settings page, click Add Connection, or select an existing service and click edit. 5 On the Add or Edit Incoming Connection page, specify the service name. 6 Specify the port(s) through which this service will communicate, then click OK. 7 On the Firewall Custom Settings page, select the checkbox next to the service, then click OK. 8 On the Desktop Firewall tab, click Save.

Close a service port

If you are not sure that a service port needs to be open, or when you stop using a service, we recommend that you close the port to prevent intrusions. To close a service port: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Connection Type, select Custom settings, then click edit. 4 On the Firewall Custom Settings page, for the port you want to close, click remove, then click OK. 5 On the Desktop Firewall tab, click Save.

Configure IP addresses for a custom connection

In addition to accepting communications through the selected service ports, client computers accept communications originating from designated IP addresses. To add one or more IP addresses: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Connection Type, select Custom settings, then click edit. 4 On the Firewall Custom Settings page, select which IP addresses can communicate with client computers:

Any computer My network Specific address range

All IP addresses. All computers with IP addresses on your local network. Only computers with IP addresses specified here. When you select this option, you must specify an address range and click Add. Address ranges that you enter appear in an Allowed IP Address Range table.

128

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

Note

When using a computer in multiple locations, you might want to specify more than one range of IP addresses. For example, you might want one IP address range for office use and another for home use. To specify multiple address ranges, repeat step 4, enter another address range, then click Add again.

5 Click OK. 6 On the Desktop Firewall tab, click Save. To remove a range of IP addresses: 1 Click in the system tray, then select Firewall Settings. 2 Click the Desktop Firewall tab. 3 Under Connection Type, select Custom settings, then click edit. 4 On the Firewall Custom Settings page, under Allowed IP Address Range, click remove for each range you want to delete from the list, then click OK. 5 On the Desktop Firewall tab, click Save.

Enable tracking of blocked events

The firewall protection service monitors inbound communications (known as events) to determine whether they meet criteria you have specified for safe communications. If an event does not meet your criteria, it is blocked from reaching computers on your network. Use a policy option to specify whether the firewall protection service keeps track of blocked events for reporting purposes. When this option is enabled, you can see a listing of all blocked events in the Inbound Events Blocked by the Firewall report. To track blocked events: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab, select Report blocked events under Firewall Reporting Configuration, then click Save.

Set up allowed Internet applications

The firewall protection service monitors communications with Internet applications, which connect to the Internet and communicate with client computers. When it detects an Internet application running on a computer, it allows the application to connect to the Internet or blocks the connection. Its response is based on these factors in this order: 1 A policy-specific list of allowed Internet applications created by the administrator. The administrator creates this list as part of a policy, then assigns the policy to groups of computers (see Specify Internet applications in a policy). 2 A list of safe applications that McAfee maintains on the www.hackerwatch.org website. By default, the firewall protection service allows applications that appear on this list. If the administrator does not want the firewall protection service to consult this list, he can configure a policy option (see Specify whether to use McAfee recommendations).

129

Total Protection Service Product Guide

Using the Firewall Protection Service

Configuring policies for firewall protection

5

3 A computer-specific list of allowed Internet applications created by user responses to detection prompts. Users are prompted for a response to application detections when their policy is configured for Prompt mode (see Select a firewall protection mode on page 123).

Specify Internet applications in a policy

When you authorize Internet applications in a policy, the firewall protection service allows the applications to connect to the Internet whenever they run on computers using the policy.

Authorize only applications you know are safe. If you are unsure an application is safe, we recommend not adding it to the allowed Internet applications list.

Note

All Internet applications detected on computers in your account are listed on the Desktop Firewall policy tab, where you can approve or block them for computers using the corresponding policy.

Figure 5-3 Desktop Firewall policy tab (Allowed Internet Applications section)

To configure allowed Internet applications in a policy: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Allowed Internet Applications, locate the application you want to allow in the listing of all applications detected on client computers. 4 Click Allow, then click Save. OR Click Allow All to allow all the programs listed, then click Save.

130

Total Protection Service Product Guide

Using the Firewall Protection Service

Viewing reports for firewall protection

5

The status of each allowed application changes to Allowed.

You can also use the Unrecognized Programs report to view a complete listing of all Internet applications detected on client computers and add them to policies (see View unrecognized Internet applications on page 132).

Tip

To remove an allowed Internet application from a policy: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab. 3 Under Allowed Internet Applications, click Block for each application you want to delete from the policy, then click Save. OR Click Block All to block all the applications listed, then click Save.

If users have approved an application to run on their computers (by responding to a detection prompt), this does not override their approval. The application will still be allowed to run on their computers. To prevent users from approving applications, select a protection mode of Protect (see Select a firewall protection mode on page 123).

Note

Specify whether to use McAfee recommendations

McAfee maintains a whitelist of Internet applications it has determined to be safe at the www.hackerwatch.org website. By default, the firewall protection service checks this website whenever it detects an Internet application that the administrator has not specified as an approved Internet application. You can change the setting of this option in a policy. To ignore McAfee recommendations for Internet applications: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Desktop Firewall tab, deselect the Use Smart Recommendations to automatically approve common Internet applications checkbox, then click Save.

Viewing reports for firewall protection

Whenever it checks for updates, each client computer also sends data to the SecurityCenter website in encrypted XML files. You can view this data in reports accessed from the Reports page. Two reports contain information about detected suspicious activity:

Unrecognized Programs (see View unrecognized Internet applications). Inbound Events Blocked by Firewall (see View inbound events blocked by the firewall).

131

Total Protection Service Product Guide

Using the Firewall Protection Service

Viewing reports for firewall protection

5

View unrecognized Internet applications

Use the Unrecognized Programs report to view a list of unapproved Internet applications that the firewall protection service detected on your network.

Figure 5-4 Unrecognized Programs report

Select the information that appears in this report: View -- List the computers where unrecognized programs were detected, the name of the programs, or the groups containing computers where unrecognized programs were detected.

Groups -- Display only the computers in a single group or display all computers in the account. (Not available when View | Groups is selected.) Report period -- Specify the length of time for which to display information. Program type -- Show all unrecognized programs, only programs blocked by the firewall protection service, only potentially unwanted programs, or only cookies.

132

Total Protection Service Product Guide

Using the Firewall Protection Service

Viewing reports for firewall protection

5

Using the Unrecognized Programs report

When you want to... Display computers or detections Do this...

Click

next to a name:

Under a computer name, show which applications were detected. Under an application name, show the computers where it was detected. Click a group name to display computers in that group. View details about a computer where a detection occurred On the Unrecognized Programs report, click a computer name to display the Computer Details page. The Computer Details page displays information about the computer, its service components, and its detections (see Display details for a computer on page 72). Click Allow, select one or more policies, then click OK. Allowed applications will no longer be detected as a threat by the firewall protection service on computers using the selected policies.

Allow an Internet application

View inbound events blocked by the firewall

Use the Inbound Events Blocked by Firewall report to view a list of programs that the firewall protection service prevented from communicating with client computers.

To view this report, the Report blocked events option must be enabled on the Desktop Firewall policy tab (see Enable tracking of blocked events on page 129). When this option is enabled, blocked events are logged for all computers using the policy.

Note

Figure 5-5 Inbound Events Blocked by Firewall report

Select the information that appears in this report: View -- List the computers where inbound events were blocked, the computers where inbound events originated, or groups containing computers where inbound events were blocked.

Groups -- Display only the computers in a single group or display all computers in the account. (Not available when View | Groups is selected.) Report period -- Specify the length of time for which to display information.

133

Total Protection Service Product Guide

Using the Firewall Protection Service

Managing suspicious activity with best practices

5

Using the Inbound Events Blocked by Firewall report

When you want to... Display computers or detections Do this...

Click

next to a name:

Under a computer name, show which detections were found. Under a detection name, show the computers where it was found. Click a group name to display computers in that group. View details about events In the Inbound Events Blocked by Firewall report, click a quantity under Events to display the Inbound Event List. The Inbound Event List shows the name of the event, the number of occurrences, and the date on which it was detected. View details about a computer In the Inbound Events Blocked by Firewall report, click a computer name to display the Computer Details page. The Computer Details page displays information about the computer, its service components, and its detections (see Display details for a computer on page 72).

Managing suspicious activity with best practices

To effectively manage your strategy for guarding against suspicious activity, we recommend that you proactively track the types of suspicious activity being detected and where they are occurring. To effectively manage your firewall protection strategy: 1 Check your status emails or the SecurityCenter website for an overview of your account's status. See Sign up for email notifications on page 67 to request status emails. 2 Check the Unrecognized Programs report frequently to monitor the Internet applications that users are allowing on client computers (see View unrecognized Internet applications on page 132). If you know some of the applications are safe and do not want them to be detected as threats, add them to policies (see Set up allowed Internet applications on page 129). 3 If you want to monitor the inbound communications that the firewall protection service has blocked, select the Report blocked events policy option, then check the Inbound Events Blocked by Firewall report regularly. 4 To centralize management and more easily monitor the types of applications and communications allowed on client computers, configure client firewall protection settings in a policy. 5 Decide whether to use McAfee's recommendations for commonly used, safe Internet applications (see Specify whether to use McAfee recommendations on page 131). When this option is enabled, applications on McAfee's whitelist are approved automatically, minimizing the need for you or users to approve applications manually.

134

Total Protection Service Product Guide

Using the Firewall Protection Service

Managing suspicious activity with best practices

5

6 Use "learn" mode to identify which Internet applications to allow (see Learn mode on page 124). This ensures that no applications required for your business are blocked before you have the opportunity to authorize their use. Then change your protection mode to Protect. 7 If particular types of intrusions are occurring frequently or certain computers appear vulnerable, update the policy to resolve these issues. Ensure that the firewall protection service is enabled. See Enable firewall protection on page 122. Carefully specify the environment where client computers are used. For users with mobile computers, ensure that they know how to select the correct connection type each time their environment changes and their policy allows them to do so. See Specify a connection type on page 124. Before installing the firewall protection service on a server, ensure that the server's system services and Internet applications are configured correctly. If there is a possibility the service might be installed when no user is present to monitor the installation, disable the policy setting for Automatically install the desktop firewall on all computers using this policy. (See Install the firewall protection service via policy on page 122). When running the firewall protection service on a server, ensure that service ports are configured correctly to prevent disruption of system services (see Configure system services for a custom connection on page 125). Ensure that no unnecessary ports are open. For maximum protection, set the firewall protection service to Protect mode to automatically block suspicious activity (see Select a firewall protection mode on page 123).

135

Total Protection Service Product Guide

Using the Firewall Protection Service

Managing suspicious activity with best practices

5

136

6

Using the Browser Protection Service

The browser protection service in Total Protection Service, based on McAfee TM SiteAdvisor , displays information to safeguard client computer users against web-based threats: A safety rating for each website (see How safety ratings are compiled on page 138). A safety report for each website that includes a detailed description of test results and feedback submitted by users and site owners. The browser protection service supports Microsoft Internet Explorer (version 6.0 or later) and Mozilla Firefox (version 1.5 or later). This section describes these features of the browser protection service: Accessing site safety information Configuring browser protection settings Submitting feedback

Accessing site safety information

On client computers, the safety data compiled by the browser protection service can be used as: A browser plugin or extension to stay safe during searches (see Staying safe during searches). A browser plugin or extension to stay safe while browsing (see Staying safe while browsing). A resource for detailed analysis, provided in site safety reports (see Viewing safety reports).

137

Total Protection Service Product Guide

Using the Browser Protection Service

Accessing site safety information

6

How safety ratings are compiled

Safety ratings are derived by testing criteria for each website and evaluating the results to assess whether the site poses a risk and, if so, what type of risk. Automated tests compile safety ratings for a website by checking for: Viruses and potentially unwanted programs bundled with downloaded files. Spam or a high volume of non-spam emails sent after submitting contact information in a signup form. Excessive popup windows. Attempts by the site to exploit browser vulnerabilities. Deceptive or fraudulent practices employed by a site. Test results are compiled into a safety report that can also include: Feedback submitted by site owners, which might include descriptions of safety precautions used by the site or responses to user feedback about the site. Feedback submitted by site users, which might include reports of phishing scams or bad shopping experiences. Analysis by McAfee employees.

Staying safe during searches

When users enter keywords into a popular search engine such as Google, Yahoo!, MSN, Ask, or AOL.com, color-coded safety icons appear next to sites listed in the Search Results page:

No significant problems.

Some issues users should know about. For example, the site tried to change the testers' browser defaults or sent them a high volume of non-spam email. Some serious issues that users should consider carefully before accessing the site. For example, the site sent testers spam emails or bundled adware with a download.

To view a site's safety balloon: Hold the cursor over the safety icon. To view a site's safety report: Click the safety icon or select More info in the safety balloon.

138

Total Protection Service Product Guide

Using the Browser Protection Service

Accessing site safety information

6

Staying safe while browsing

When users browse to a website, the SiteAdvisor toolbar displays a color-coded menu button (the location depends on the browser):

To display the SiteAdvisor toolbar: In Internet Explorer, select View | Toolbars | McAfee SiteAdvisor. The SiteAdvisor toolbar is always displayed in Firefox. To display the SiteAdvisor menu: Click the SiteAdvisor menu button. Available menu commands depend on the browser.

To do this... Select this option... Internet Explorer Display the current site's safety balloon. Not available when the browser protection service is disabled. Display the safety report for the current site. Not available when the browser protection service is disabled (Internet Explorer) or the Enable safe browsing button option is not selected (Firefox). Configure settings for browser protection (see Configuring browser protection on the client computer on page 141). Add a website to the list of approved sites. The user will not receive warnings when viewing or downloading from sites on this list. Enable or disable the color coding for the SiteAdvisor menu button. Send an email to a friend explaining how to download a free trial version of the browser protection service. Open a form to submit a site for testing, submit user or owner feedback about a site, or contact product support (see Submitting feedback on page 142). Install the latest version of the browser protection service or check whether the latest version is running. Firefox

Show balloon

View site details

View Site Details

Settings

Settings

Do Not Warn list

Disable/Enable Tell a friend Tell a Friend

Send feedback

Send Feedback

Get latest version

139

Total Protection Service Product Guide

Using the Browser Protection Service

Configuring browser protection settings

6

To do this...

Select this option... Internet Explorer Firefox

Access an online list of Frequently Asked Questions about browser protection. Access a brief description of the browser protection service, its license agreement, and its privacy policy.

Help About

Help About

Viewing safety reports

Users can supplement the color-coded safety information for a site by viewing its detailed safety report. These reports describe specific threats discovered by testing and include feedback submitted by site owners and users. To view the safety report for the current site: From the SiteAdvisor menu, select View Site Details. OR Click the safety icon in a Search Results page. To view a safety report from the www.siteadvisor.com website: On the www.siteadvisor.com Home page or Analysis page, enter a URL into the Look up site report box.

Configuring browser protection settings

Policies define the operational settings for all your protection services. See Setting up policies on page 81 for general information about using policies. In this release, users configure most browser protection features at their computers. From the SecurityCenter, administrators can configure whether to install the browser protection service automatically as part of a policy. Configuring browser protection from the SecurityCenter Configuring browser protection on the client computer

Configuring browser protection from the SecurityCenter

Currently, administrators can configure one option on the Browser Protection tab of the SecurityCenter.

Installing via policy

Use this option to install the browser protection service on client computers automatically whenever they check for an updated policy. This feature is useful for adding only the browser protection service on computers where the Total Protection Service client software is already installed. In the McAfee Default policy, this feature is enabled.

140

Total Protection Service Product Guide

Using the Browser Protection Service

Configuring browser protection settings

6

To add this feature to other policies, you must edit an existing policy or set up a new policy and then assign it to one or more groups of computers (see Creating groups to manage your site on page 76 and Setting up policies on page 81). To install the browser protection service via policy: 1 On the Groups + Policies page, click Add Policy (or click Edit Policy to modify an existing policy). 2 Click the Browser Protection tab. 3 Select Automatically install browser protection service on all computers using this policy, then click Save. The browser protection service will be installed on all computers using this policy the next time they check for an updated policy.

Configuring browser protection on the client computer

Users can configure settings for additional browser protection features. To configure browser protection settings: 1 From the SiteAdvisor menu, select Settings. 2 Select one of the available commands, then click OK.

To do this... Select this option... Internet Explorer Select or decline to join the product improvement program. Participants in the program can send anonymous feedback on product performance. Highlight the entire link that appears in the Search Results page with green, yellow, or red. Enable or disable the display of safety icons next to website links in a Search Results page. Encrypt the data sent to the server using the Secure Sockets Layer protocol. This prevents intruders from tracking user browsing patterns. Enable or disable the color coding for the SiteAdvisor menu button. Firefox

Participate in product improvement program Highlight search result links Show verdict in Safe Search Use SSL communications to server Highlight search result links Display safe search icons Use SSL communications to server Enable safe browsing button

141

Total Protection Service Product Guide

Using the Browser Protection Service

Submitting feedback

6

Submitting feedback

McAfee encourages feedback about websites: Users can describe suspicious or dangerous behavior they encounter when visiting a site. Site owners can provide helpful information or respond to user feedback about their site. Feedback is displayed in the site's safety report.

Users and site owners must register before submitting information to McAfee. A link is provided in the feedback form.

Note

Users can also use the feedback feature to offer general suggestions, report problems, and contact product support.

The feedback feature requires the browser to accept cookies. For instructions, select Help from the SiteAdvisor menu.

Note

To submit feedback: 1 From the SiteAdvisor menu, select Send Feedback. 2 From the drop-down list, select the appropriate action.

Submit a site for testing Leave user comments about a site Leave comments as a site owner General McAfee Product Support

Enter the URL for a website you would like McAfee to test. Enter your contact information, the website's URL, and your comments. Enter your contact information, your website's URL, and your comments. Select a link for customer service, technical support, virus removal services, or support for software installed by a McAfee partner. A page appears with answers to common questions and links for assistance. Click send an e-mail to open a preaddressed message for discussing business partnerships or requesting the use of SiteAdvisor data.

Contact our business team

142

7

Using the Email Security Service

The email security service in Total Protection Service -- Advanced scans messages before they are received by client computers and quarantines detections. Your service checks for spam, phishing scams, viruses, directory harvest attacks, and other email-borne threats in messages and attachments. The email security service resides outside your network, requiring no system resources. Your company's mail exchange (MX) record is redirected through McAfee's servers. There, your email traffic is scanned before entering your network, with less than a one-second delay in transit. The email security service provides: Protection from email-borne threats -- The flood of email threats is stopped before entering your network. Real-time, around-the-clock email security -- Email is processed all day, every day in real time through a highly secure system architecture that operates with no detectable latency. Simplified management -- Centralized, web-based policy management allows you to configure comprehensive policies for spam, viruses, and content-filtering (for inappropriate words and phrases). You can also view reports on email usage and check quarantined messages. To use the email security service, your company needs to have its own mail domain, such as yourdomain.com, with a static IP address and a dedicated email server, either in-house or hosted by an ISP. This section describes these features of the email security service: Activating the email security service Using the portal Setting up your account Viewing your email protection status Configuring a policy for email security Viewing reports for the email security service Managing quarantined email Getting more information

143

Total Protection Service Product Guide

Using the Email Security Service

Activating the email security service

7

Activating the email security service

Activate your email security service through a unique registration website, which you access from the SecurityCenter website. To activate your account: 1 On the SecurityCenter website, click the SecurityCenter tab. 2 Click Install Protection. 3 Select Install email security service. 4 Click the URL to open the activation wizard. 5 From the SecurityCenter, copy the activation key, then paste it into the field in the activation wizard. 6 Answer the questions in the wizard. Activation takes about an hour to complete. When it is complete, reporting information appears on the SecurityCenter page, and you receive an email with instructions for changing your mail exchange (MX) records. At this point, you can set up and configure your account through the service's portal.

Using the portal

The portal is a website, which you access from the SecurityCenter, where you perform most management functions for the email security service. You can configure your service, check email statistics and activity, and view reports through the portal. To access the portal: 1 On the SecurityCenter website, click the SecurityCenter tab. 2 Under Your email protection, select Click here to configure, or click an area of the pie chart.

144

Total Protection Service Product Guide

Using the Email Security Service

Setting up your account

7

Figure 7-1 Email security service's portal

Setting up your account

When your account is activated, you can set it up to filter email for users in its activation domain, the domain you specified in the activation wizard. Update your MX records Customize your account settings Configure general administration settings

Update your MX records

To filter email for users in the activation domain, you must change the domain's mail exchange (MX) records to direct email flow to McAfee servers. These records might be managed by you or your service provider. You need to change them as instructed in the last step of the activation wizard or in the email you received after activating your account. You can also view instructions on the Administration tab under DNS Instructions.

Customize your account settings

From the portal, you can customize the email security service to better suit your company's needs. For example, you can add more domains, add users, and set up additional filters. Default settings Recommended first steps Optional customization

145

Total Protection Service Product Guide

Using the Email Security Service

Setting up your account

7

Default settings

As soon as your email security service is activated, default functionality and features are configured. Two users appear on the Users tab: Your administrator login address. A default user (whose name begins with pdefault), which you should ignore.

Do not delete the pdefault entry.

Caution

Users in the activation domain automatically receive virus protection and basic attack blocking. However, your users will not receive spam filtering protection until they are added to the email security service. Registered users receive a daily Quarantine Summary email, which lists recent spam detections. Users can review the list and optionally forward any false positives to their Inbox (see Managing quarantined email on page 152). The activation domain is entered on the Domains page (on the Administration tab), and your email server is entered under Delivery Manager (on the Servers tab). Users can contact you for assistance via a support address, which initially is your administrator login address. Automatic disaster recovery is enabled via spooling: Should your email server stop functioning, messages are temporarily saved to the McAfee server, then automatically delivered when your server begins functioning again.

Recommended first steps

We recommend you follow these steps to configure your service for enhanced security, quick response to problems, and disaster recovery. 1 Add your other domains. If users in multiple domains need email protection, add those domains to your email security service. (You don't need to add subdomains, such as corp.yourdomain.com or sales.yourdomain.com. Instead, set up subdomain stripping for the primary domain.)

SmartCreate, which automatically adds users accounts, works only for domains that have been added to the email protection service.

Note

2 Add partners, associates, and other friendly addresses to the Approved Senders list. This helps prevent false positives.

146

Total Protection Service Product Guide

Using the Email Security Service

Setting up your account

7

3 Set up your email server to prevent spam and viruses from circumventing the email security service. Some virus and spam senders specifically target email servers using low-priority DNS MX records or by looking up a server directly with an intuitive name like mail.yourdomain.com. To prevent them from bypassing the email security service, we recommend that you add all your domains to the email protection service, and configure your email server to accept mail only from the email security service. 4 Configure alerts about significant server events to be sent to your (the administrator's) wireless device. To ensure that you are alerted immediately to significant server events, such as when a host stops functioning or spooling begins, we recommend setting up alerts for both Delivery Manager and Spool Manager. Also, it's important to send alerts to an address at a wireless device rather than an address routed through the data center, because the data center would potentially be disabled by the event triggering the alert. 5 If your email server receives valid traffic from trusted relay severs, use Connection Manager to allow those servers' IP addresses, so their traffic is not misinterpreted as an attack and blocked. A trusted relay server passes significantly more traffic to your email server than other servers. Therefore, its traffic is likely to be blocked by Connection Manager. To prevent this from happening, specifically allow those servers' IP addresses.

Optional customization

Answer these questions to fine-tune your email security settings. 1 Do you want to add users to the service manually, rather than having them added automatically? By default, users in your domains are added automatically to the email security service, using SmartCreate (under General Settings on the Administration tab). If you do not want this to happen, disable SmartCreate and add users manually. You might want to do this if you do not want all users to receive spam filtering. (Users you do not add will still receive virus protection.) 2 Do you want to filter a specific category of spam more or less aggressively than average? Spam filters are initially adjusted to catch as much spam as possible without falsely tagging legitimate messages as spam. You might need to fine tune these settings, or adjust sensitivity of filters for individual spam categories, including sexually explicit or racially insensitive messages, get-rich-quick offers, and special commercial offers. For example, you might want to filter sexually explicit messages more aggressively, while allowing special offers. 3 Do you want to prevent users from delivering quarantined messages to their Inboxes? Do you want to deny them access to quarantined messages altogether? Initially, users receive a Quarantine Summary email listing recently quarantined messages, and they can optionally deliver legitimate messages from their quarantine to their Inbox.

147

Total Protection Service Product Guide

Using the Email Security Service

Setting up your account

7

You can turn off the Quarantine Summary or block users from delivering quarantined messages to their Inbox (in this case, users will have to contact an administrator to forward legitimate messages for them). 4 Do you want to manage all users' quarantined messages in one central quarantine, rather than separate user quarantines? Initially, each user's detected spam is quarantined in an individual user quarantine, where you can go to manage that user's spam. If you prefer to manage all your organization's spam from one location, you can divert all spam to a central quarantine by changing your spam disposition. 5 Do you want to allow attachments larger than 200 MB, or block attachments smaller than that? By default, the protection service blocks all messages containing attachments that are larger than 200 MB. These messages are not delivered to users and cannot be retrieved. You can change this size limit using Attachment Manager on the Applications tab. 6 Do you want to prohibit or approve messages based on the file type of any attachment? On the Applications tab, enable Attachment Manager and configure a custom filter or one of the file type filters. For example, you might want to block potentially dangerous executable attachments, such as .EXE files, but specifically allow certain image file types. 7 Do you want to prohibit or approve messages based on text in the message? On the Applications tab, create Content Manager filters. For example, you might want to allow all messages containing the text "résumé" to make sure that no incoming resumes are accidentally filtered as spam. 8 Do you want to adjust sensitivity for blocking specific types of server attacks? Connection Manager automatically detects attacks against your email server, including directory harvest attacks, virus outbreaks, and spam attacks. You can optionally detect email bombs and change the sensitivity of blocking for individual types of attacks.

Configure general administration settings

Manage general system administration of the email security service on the Administration page. To configure administrative settings: 1 On the SecurityCenter website, click the SecurityCenter tab. 2 Under Your email protection, select Click here to configure.

148

Total Protection Service Product Guide

Using the Email Security Service

Setting up your account

7

3 On the portal, click the Administration tab.

Figure 7-2 Administration page

Access basic administration features on the Administration page:

Use this feature... To... View your current domains. Add or delete a domain. Enable/disable subdomain stripping for a domain.

Test and trace mailflow. Test server latency. Verify your MX record configuration.

Modify your company name or support address. Choose how to handle messages to unrecognized addresses in your domains. Configure your domain's MX records to point to the email security service's primary and backup data centers.

Track how many users are receiving email protection. Check whether you have reached any prescribed limit. Send automatic administrator alerts.

Send users a periodic email summary of recently quarantined messages. Turn off the Quarantine Summary.

149

Total Protection Service Product Guide

Using the Email Security Service

Viewing your email protection status

7

Use this feature...

To... View a monthly summary of usage of the email security service.

Summary

This chart can be helpful for Help Desk personnel. View your organization's unique ID (created automatically). View your organization name, which you can change under General Settings. View the date your service was established. View the number of users currently added to the email security service and a link to listing them. View the domains that have been added to your service and a link to managing them.

Viewing your email protection status

Once your email security service is running, check the SecurityCenter page of the SecurityCenter website to view your email traffic, including spam, viruses, and delivered messages from the prior seven days. Data on the last 60 minutes of your email traffic is available by clicking the pie chart. Key issues that require attention are noted in the action items at the top of the SecurityCenter page (see View and resolve action items on page 69). To view the status of your service: 1 On the SecurityCenter website, click the SecurityCenter tab. 2 Under Your email protection, check your email statistics. 3 Click the pie chart to open the portal, where you can view data for the last seven days of email activity. To resolve action items: Click an action item to display instructions for resolving it.

150

Total Protection Service Product Guide

Using the Email Security Service

Configuring a policy for email security

7

Configuring a policy for email security

Configure security settings for your email security service by setting up a policy. (You can set up only one policy for your email security service account.) To set up a policy for email security: 1 On the SecurityCenter website, click the Groups + Policies tab. 2 Select Add Email Security Policy. If you have purchased only the email security service, this option appears on the page. If you have purchased multiple protection services, click the down arrow the Groups + Policies tab, then select Add Email Security Policy from the menu. 3 On the portal, click the Applications tab. 4 Select type of settings you want to configure:

Spam Filtering -- Enable spam filtering, specify the type of messages to filter, specify how to handle detections, then click Save. Virus Blocking -- Enable virus protection and specify how to handle detections, then click Save. Sender Lists -- Add email addresses to allow or block.

on

Viewing reports for the email security service

Check the Reports page of the SecurityCenter website to access report data from the email security service. To view report data: 1 On the SecurityCenter website, click the Reports tab. 2 Select Email Security Reports. 3 On the portal, click the Reports tab. 4 Click the name of a report. You can click the Help link for more information about the data in each type of report.

151

Total Protection Service Product Guide

Using the Email Security Service

Managing quarantined email

7

Managing quarantined email

The email security service quarantines email messages that contain detected spam, phishing, and virus threats. Several tools are available for managing these messages: View and manage quarantined user messages Check the Quarantine Summary View quarantined mail deliveries

View and manage quarantined user messages

For each primary user email account, you can check the status of quarantined messages, view details about them, and specify processing tasks. To manage user messages: 1 On the portal, click the Users tab. 2 Select a user's email address. 3 Select Quarantine. From the listing, you can sort, filter, and process messages. You can click the Help link for more information about managing quarantined messages.

Check the Quarantine Summary

The email security service sends users a Quarantine Summary, which lists the messages that have been quarantined for them since they last received a summary. These messages have not yet been delivered or deleted. The Quarantine Summary enables users to quickly determine the type and number of messages that were quarantined. It lists: Sender, subject, and time received. Total number of quarantined messages. Messages containing detected viruses. Messages containing detected spam or phishing scams. Users can check the Quarantine Summary to detect any false positives that were quarantined by mistake and restore those messages to their email Inbox. Messages containing viruses are cleaned before they are restored. As the administrator, you determine how often users receive the Quarantine Summary. It is sent to each user's primary email address, which you register with the email security service. If the service does not detect and quarantine any email threats, it does not send a Quarantine Summary. Quarantined messages are deleted automatically after two weeks. You also configure whether users can deliver quarantined email to their Inboxes. (If they cannot deliver email, the Deliver link does not appear in the Quarantine Summary.) Click the Help link on the portal for more information.

152

Total Protection Service Product Guide

Using the Email Security Service

Getting more information

7

To restore quarantined email to an Inbox: Provide these instructions to your users: 1 Open the Quarantine Summary. 2 To restore a message, click Deliver.

View quarantined mail deliveries

Administrators can track the number and type of quarantined messages that users deliver to their Inboxes by viewing Quarantine Delivery reports. Use these reports to determine whether too many false positives are being detected and quarantined, and whether users are delivering inappropriate messages. To view quarantine deliveries: 1 On the portal, click the Reports tab. 2 Under Quarantine Delivery, select Activity Log. 3 Select Inbound Weekly Log or Inbound Daily Log, depending on the number of days for which you want to view data. You can click the Help link for more information about managing quarantined messages.

Getting more information

Detailed information, instructions, and troubleshooting procedures are available in the Administration Guide. To access the Administration Guide: On the portal, click the Help link in the top right corner of any page. Context-sensitive information appears, and you can navigate to any topic in the guide.

153

Total Protection Service Product Guide

Using the Email Security Service

Getting more information

7

154

8

Troubleshooting

For help installing, using, and maintaining Total Protection Service, refer to frequently asked questions or specific error messages and their solutions. Uninstalling protection services Frequently asked questions (FAQ) Error messages Contacting product support

Uninstalling protection services

For testing purposes or before reinstalling the client software, you might need to uninstall the client software.

If you uninstall the client software, the computer is no longer protected. we recommend that you reinstall as soon as possible.

Caution

To uninstall the client software from a client computer: 1 Close the Microsoft Outlook and Internet Explorer applications. 2 In the Windows Control Panel, open Add/Remove Programs. 3 Select McAfee Virus and Spyware Protection Service from the list, then click Remove. 4 Select McAfee Firewall Protection Service from the list, then click Remove.

On computers running Windows XP or Windows Vista, the Windows firewall is automatically re-enabled when the Total Protection Service firewall protection service is uninstalled. This ensures that the computer is always protected by a firewall program.

Note

5 Select McAfee Browser Protection Service from the list, then click Remove.

155

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

Frequently asked questions (FAQ)

This section includes questions asked by administrators and client computer users. Installing Using pre-installed or CD versions Adding, renewing, and moving licenses Configuring and managing policies Scanning Reporting Updating Firewall protection Browser protection Email General

Installing

How do users without administrator rights install the service with an Internet URL? To allow users without administrator rights to install protection services, you must first load a standalone installation agent on their client computers. See Install the standalone installation agent on page 36 for more information. Does it matter which email address or identifier I enter when installing Total Protection Service? No. Any description can be entered in the field, or it can be left blank. However, an email address provides a link for notifying the principal user about security issues for the computer. The information entered identifies the client computers in administrative reports. While installing Total Protection Service, the installation process appears to stop responding. The installation might take a few minutes to complete. However, if the status bar stops moving and nothing in the installation window has changed in more than five minutes, close the window and start the installation process again (for example, by clicking the installation URL). Do access protection or behavior blocking rules in other applications affect installation of Total Protection Service? Yes. If users are unable to install the client software and you have defined access protection or behavior blocking rules, such as those that would prevent binaries from executing from the TEMP folder, disable them and try installing again.

156

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

Using pre-installed or CD versions

Why should I activate each copy of Total Protection Service? The first time a user turns on a computer with a pre-installed copy of Total Protection Service or installs Total Protection Service from a CD, the computer is updated with the latest detection definition (DAT) files. No more updates occur until the copy of Total Protection Service is activated. To ensure that the computer is always protected against the latest threats, activate the copy as soon as possible. How do I get another account enrollment key if mine is lost or expired? From the My Account page, check the Account Enrollment Key section to view your existing key. If no key exists, click Create a new key to create one. How can I protect a computer while I purchase additional licenses? Install Total Protection Service as a trial. Then purchase additional licenses and merge the trial account into your main account (see Merge another account into your account on page 92 for more information). What if I can't find my license key or the key is not valid? If you do not have a valid license key when you install Total Protection Service, you can obtain one and register it later. Activating Total Protection Service as a trial ensures that your computer is protected while you obtain a license key (see Activating the copy of Total Protection Service on page 50 for more information). How do I know when new installations of Total Protection Service have joined my account? Do I need to perform any setup tasks for them? An action item appears on the SecurityCenter's main page to notify you when new computers have been added. By default, they are placed in the Default Group and assigned the McAfee Default policy. If you want to change these settings, click the action item for instructions. If you do not want to change these settings, click the action item, then click Dismiss This Action Item.

Adding, renewing, and moving licenses

I purchased licenses for new computers, but the new computers don't show up on my reports. When you purchase additional services or renew services, use the same email address that you used when purchasing the original services. Also, place your order from the same SecurityCenter website where you purchased your original services. This ensures that your new services have the same company key (CK) as your existing service and show up on the same reports. If you do need to merge multiple accounts, use the Manage Accounts section of the SecurityCenter My Account page (see Merge another account into your account on page 92). Can I move a license from one computer to another? Yes. You can uninstall Total Protection Service from one computer and install it on a new computer without affecting the total number of licenses you are using. The old computer is automatically subtracted from your total license count on the service's accounting system, and the new one added, so that your license number remains constant.

157

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

1 Uninstall the software from the old computer (see Uninstalling protection services on page 155). 2 From the SecurityCenter, click the Computers tab. 3 For Groups, select All, then select the old computer in the listing and click Delete. 4 Install the software on the new computer (see Installing Total Protection Service on page 37). The new computer appears in your reports after it uploads its status information to the SecurityCenter. This usually takes about 20 minutes. My computer crashed and I had to reinstall the operating system and start over. Will this affect my license number? No. The old computer is automatically subtracted from your total license count on the service's accounting system, and the new one added, so that your license number remains constant. 1 From the SecurityCenter, click the Computers tab. 2 For Groups, select All, then select the old computer in the listing and click Delete. 3 Install the software on the reformatted computer (see for Installing Total Protection Service on page 37). The new computer appears in your reports after it uploads its status information to the SecurityCenter. This usually takes about 20 minutes.

Configuring and managing policies

How can I prevent popup prompts from appearing when unrecognized programs are detected? The virus and spyware protection service and the firewall protection service prompt users for a response to a potentially unwanted program or Internet application detection when set to Prompt mode. To prevent popups, select Protect or Report mode. For highest protection, select Protect to automatically delete unrecognized programs (virus and spyware protection service) or block unrecognized Internet applications (firewall protection service). For more information, see Select a spyware protection mode on page 108 or Select a firewall protection mode on page 123. Why would I want to specify excluded files and folders or approved programs? Specifying excluded files and folders from scanning can be useful if you know a particular type of file is not vulnerable to attack, or a particular folder is safe. If you use a program or Internet application to conduct your business, adding it to a list of approved programs or allowed Internet applications keeps it from being detected as unrecognized and deleted or blocked. If you are unsure, it is best not to specify exclusions.

158

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

Why does the firewall protection service ignore user settings, such as allowed Internet applications? It did not ignore them last week. If the previous policy allowed users to configure settings and the current policy does not, user settings are ignored. However, user settings are saved on client computers. If the policy is later updated to allow users to configure settings, their firewall protection service again recognizes their settings, such as allowed Internet applications. Can I add approved programs and allowed Internet applications to multiple policies at the same time? Yes. A link in the Unrecognized Programs report lets you add a program to multiple policies. When you click Allow, the SecurityCenter displays a listing of all the policies you have created where the program is not currently added. You can select up to 10 of these policies at a time. (After saving 10 policies, you can continue selecting and updating up to 10 policies at a time until you are done.) Can I add approved programs and allowed Internet applications to the McAfee Default policy? No. However, you can create a new policy and add them. When you click Add Policy on the Groups + Policies page, the new policy is prepopulated with the McAfee Default policy settings. Specify a name for the new policy, save it, and then add approved programs and allowed Internet applications as needed.

Scanning

How do I prevent certain files or folders from being scanned for viruses? The policy management feature allows you to specify files, folders, or types of files to exclude from scanning for viruses (see Exclude files and folders from virus scans on page 104). How do I prevent certain programs from being scanned for spyware? The policy management feature allows you to specify approved programs that will not be detected as potentially unwanted programs (see Specify approved programs on page 109). Users can also specify approved programs on their own computers. Is there a "learn mode" to help me discover which programs I need to approve? Yes. When you first install the virus and spyware protection service, select Prompt mode, then check the Unrecognized Programs reports frequently to see which programs are detected on client computers (see Learn mode on page 109). After you add the ones you need to your list of approved programs, you can change to Protect or Report mode. Can I stop a scheduled scan once it has started? No. Once a scheduled, on-demand scan has started, you cannot stop the scan unless you restart the computer.

159

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

Why do on-demand scans sometimes detect items that on-access scans don't detect? With the default policy settings, on-access scans do not look at compressed archives and on-demand scans do. If this is a concern for you, reconfigure these policy settings (see Enable optional protection on page 106). If the policy does not use default settings, options might be selected to scan different files during on-access and on-demand scans. See Scan automatically (on-access scans) on page 97 and Scan manually (on-demand scans) on page 98 for more information.

Reporting

How do I find my reports? Log on to the SecurityCenter, then click the Reports tab to display links to available reports. I'm looking at my report and some of my computers don't show up there. If your company added more computers, or upgraded from trial to full product, some computers might not appear in your reports. If you upgraded or purchased additional services using a new email address, you received a new company key and URL for a new account instead of adding licenses to your existing account. (The company key appears after the characters CK= in the URL.) Because you have two company keys, reports appear in two places. Make sure all your trial users reinstall with the installation URL associated with the new key. If you do need to merge multiple accounts, use the Manage Accounts section of the SecurityCenter My Account page (see Merge another account into your account on page 92). Can I use a non-Microsoft browser to view reports? Yes. You can view the SecurityCenter website using Internet Explorer (version 5.5 or later) or Firefox (version 1.5 or later). My cloned systems all report as the same computer. Total Protection Service generates a unique system identifier when it is installed. If a drive is imaged after the software was installed, all the cloned systems have the same system identifier. To avoid this problem, the software must be installed after the new systems are restarted. You can do this automatically using the silent installation method. How long does the server save old report data? Your data is saved for your full license period, and continues if the license is renewed. I just installed Total Protection Service and don't have much information on my SecurityCenter website. Can I view sample reports? Yes. Sample reports are available at: http://www.mcafeeasap.com/intl/EN/content/virusscan_asap/samplereports.asp Sample reports are useful for new administrators who do not have many users or much detection data and, therefore, cannot view some advanced reporting features.

Sample reports are available in all product languages. Select the language from the Global Sites pull-down list in the upper right corner of the page.

Note

160

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

Updating

When does Total Protection Service check for updates? Client computers check for new updates five minutes after connecting to the network, and at regular intervals throughout the day. You can specify the interval in the computer's policy (see Select your update frequency on page 105). To run an update manually on a client computer, double-click in the system tray.

If there is an outbreak, how soon will client computers receive an updated detection DAT file? McAfee Avert Labs provides updates as soon as possible after an outbreak. To ensure that client computers receive them promptly, make sure the policy's Enable outbreak response option is selected (see Enable optional protection on page 106). During an update, I get a message that one or more Total Protection Service windows are open, but I don't see any windows open. What should I do? This occurs when a task that cannot be stopped, such as a scheduled scan, is running in the background. Wait for the task to complete, or restart the computer to proceed with the update. How can I stop errors from showing up in my reports when automatic updates fail on systems where no user is logged on? For certain system configurations, automatic updates do not occur on systems where no user is logged on. You can prevent these failed updates from being reported by configuring a policy setting (see Update computers where no user is logged on on page 60).

Firewall protection

Is there a "learn mode" to help me discover which Internet applications I need to approve? Yes. When you first install the firewall protection service, select Prompt mode, then check the Unrecognized Programs reports frequently to see which applications are detected on client computers (see Learn mode on page 124). After you add the ones you need to your list of allowed applications, you can change to Protect or Report mode. Is it okay to run the Windows firewall and the firewall protection service at the same time? We recommend that you disable the Windows firewall when the firewall protection service is running. (It is disabled automatically when the firewall protection service is installed.) If both firewalls are enabled, the firewall protection service lists only a subset of the blocked IP addresses in its Inbound Events Blocked by the Firewall report. The Windows firewall blocks some of these addresses; however, it does not report them because event logging is disabled in the Windows firewall by default. If both firewalls are enabled, you must enable Windows firewall logging to be able to view a list of all blocked IP addresses. The default Windows firewall log is C:\Windows\pfirewall.log. In addition, there will be some duplication of status and alert messaging.

161

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

How do I keep the firewall protection service from blocking certain Internet applications? The policy management feature allows you to specify allowed Internet applications that will not be blocked (see Set up allowed Internet applications on page 129). Users can also specify allowed Internet applications on their own computers if their policy allows. I blocked Internet Explorer on a client computer, and then temporarily disabled the firewall protection service. When I re-enabled the service, why was Internet Explorer no longer blocked? The firewall protection service uses Internet Explorer to update product components. Whenever you enable the service, Internet Explorer is given Full Access in order to check for updates. Why does the firewall protection service ignore user settings, such as allowed Internet applications? It did not ignore them last week. If the previous policy allowed users to configure settings and the current policy does not, user settings are ignored. However, user settings are saved on client computers. If the policy is later updated to allow users to configure settings, their firewall protection service again recognizes their settings, such as allowed Internet applications. Why does the firewall protection service ignore settings configured by the administrator? If the administrator configures Prompt mode, user settings take precedence over administrator settings. The administrator can always add to the list of Allowed Applications.

Browser protection

Can users run the browser protection service for Internet Explorer and Firefox on the same computer? Yes. The browser protection service for Internet Explorer and Firefox are compatible on the same computer. Users can install protection for both browsers. (If both browsers are present on a computer when browser protection is installed, protection for both browsers is installed automatically.) Is it safe to use the browser protection service as my only source of security against web-based threats? No. The service tests a variety of threats, and constantly adds new threats to its testing criteria, but it cannot test for all threats. Users should continue to employ traditional security defenses, such as the virus, spyware, and firewall protection services in Total Protection Service, for a multi-tiered defense.

Email

Is my computer protected from email viruses? Yes. The virus and spyware protection service (on desktop client computers) features an on-access scanner that scans email messages and attachments as they are accessed or opened. It also cleans infected email messages before they are delivered to the user's Inbox when the Scan email option on the Advanced Settings tab is enabled (see Enable optional protection on page 106).

162

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

For enhanced email security, McAfee offers Total Protection Service -- Advanced. With this solution, you have the power of an email security service that routes email messages through McAfee servers and scans them for spam, viruses and other threats before they are received by client computers. Detections are blocked or quarantined. An email server security application can also be implemented to protect Microsoft Exchange and Lotus Domino email servers against viruses and spam. Can I scan email messages on demand? Yes. In your Microsoft Outlook Inbox, select one or more messages, then from the Tools menu, select Scan for Threats. After installing the email security service, why am I not receiving email or seeing any charts on the email service's portal? To determine and resolve the problem, visit the email security service's portal (see Using the portal on page 144) and run the System Tests listed on the home page. Refer to the Administration Guide for more information on the tests (see Getting more information on page 153).

General

Can I use a non-Microsoft browser, such as Mozilla Firefox or Opera? Yes. The client computer must use Microsoft Internet Explorer 5.5 SP2 or later to install the client software. However, once the client software is installed, the default Internet browser can be used for other purposes. You can view the SecurityCenter using Internet Explorer or Firefox. I use Windows XP Service Pack 2, and I get a message that my computer may be at risk. What does this mean? This is a known problem with Microsoft Security Center, because Microsoft cannot determine that Total Protection Service is installed and up-to-date. If you get this message when starting your computer, click the message balloon to open the Recommendation window, select I have an antivirus program that I'll monitor myself, then click OK. I want to update the Windows operating system on my client computer. Do I need to reinstall Total Protection Service? Yes. If you upgrade a client computer's operating system (for example, from Windows 2000 to Windows XP) and you want to leave your existing files and programs intact during the upgrade, you must first uninstall Total Protection Service, then reinstall it after the upgrade is complete. Is it okay to delete the Temp folder in my program's directory structure? No. Updates might fail if the TEMP folder does not exist. If you delete the folder inadvertently, restart the computer to re-create the folder automatically, or manually create a TEMP folder under the PROGRAM FILES\MCAFEE\MANAGED VIRUSSCAN directory.

163

Total Protection Service Product Guide

Troubleshooting

Frequently asked questions (FAQ)

8

I copied a virus to my computer as a test and nothing seemed to happen. Why didn't my virus protection service detect it? The virus and spyware protection service quietly detects and cleans most types of viruses without notifying users. This reduces help desk calls and minimizes user interruptions. However, virus detections are always noted on the administrative reports. Verify that the virus was found by checking the reports from the SecurityCenter website. The system tray icon is missing. How do I make it appear again? On the client computer, click Start | Programs | McAfee | Total Protection Service | McAfee Total Protection to display in the system tray. How can I speed up the time it takes the SecurityCenter to display all the computers in my account? The Computers page lists up to 1000 computers. For larger accounts, we recommend organizing your computers into groups of no more than 100 computers to optimize SecurityCenter performance. Why does the online help not display correctly? If the built-in help system displays incorrectly on a client computer, its version of Microsoft Internet Explorer might not be using ActiveX controls properly. These controls are required to display the help file. Make sure that you install the latest version of Internet Explorer with its Internet security settings set to Medium or Medium-high.

164

Total Protection Service Product Guide

Troubleshooting

Error messages

8

Error messages

Click these links to see details about common error messages and solutions: Activate your software. A file needed to install the software is not available. Please click the installation URL to begin the installation process again. Cannot find remote shared directory. File does not exist. Installation cannot proceed because you have selected not to accept a vital agent component.... Installation Declined. Installation Denied. Invalid Entitlement Error. MyASUtil.SecureObjectFactory error message. MyINX Error. On-access scan is currently disabled. Unable to connect to Total Protection Service update server. Failed to connect to server for updates. Unable to create Cab Installer Object. Update failed. Your software is not up-to-date. Please activate to receive the latest update. Your subscription has expired. Your trial has expired. Renew your subscription to re-activate your software. Purchase a subscription to re-activate your software. Activate your software. You have not activated your copy of Total Protection Service. You cannot receive updates against the latest threats until you activate. To activate, click the Total Protection Service icon in the system tray, then select Activate, or select the Activate link in a notification dialog box. A file needed to install the software is not available. Please click the installation URL to begin the installation process again. When a user clicks the installation URL to download the installation file, a cookie is created. The cookie expires after 24 hours. If the user saves the installation file and then tries to install it after 24 hours have passed, or deletes the cookie, that user must download the file and begin the installation process again.

165

Total Protection Service Product Guide

Troubleshooting

Error messages

8

Cannot find remote shared directory. This error appears during a failed push installation. The target computers did not meet one or more of the following requirements: File and Print Sharing must be enabled. User-level access control must be configured. The person initiating the push must have domain administrator rights. They must not be running Microsoft Windows XP Home Edition, which does not support Windows NT Domain logins. Check if the client computer you are pushing to has the appropriate shares enabled, and if you have appropriate administrator rights to perform a push installation to that computer. To check: 1 On the client computer, select Start | Run. 2 In the Open text box, type \\CPUNAME\ADMIN$ (where CPUNAME is the name of the computer to which you are pushing); then click OK. The \WINDOWS directory of the computer to which you are trying to push should be displayed. If you do not have sufficient administrator rights to that computer, or if that computer does not have appropriate user-level access and sharing enabled, a Network path not found error dialog box appears. 3 See your Windows networking documentation for information on fixing your network administrative settings. File does not exist. This Microsoft Windows error might appear in the foreground at the same time the threat detection dialog box displayed by the virus and spyware protection service appears in the background. This error verifies that the service is protecting your computer from threats. When you clicked to open an infected file from Windows Explorer, the service's on-access scanner immediately detected and deleted the file, so that Windows could not open it. Installation cannot proceed because you have selected not to accept a vital agent component.... The full text of the error message is Installation cannot proceed because you have selected not

to accept a vital agent component, you don't have administrative rights to your machine, or other issues occurred. This error message can be caused by several different problems:

The security level of the browser is too high. Set the browser's security level to Medium or Medium-high (see Configure your browser on page 35). The user doesn't have administrator rights. Users must have administrator rights to install protection services on client computers. If they do not, you need to install the standalone installation agent (see Install the standalone installation agent on page 36). A registry file is missing. The system file REGEDIT.EXE might be missing. Search for that file in the client computer's \WINDOWS folder. If the file is missing, replace it using the original Windows install media or copy it from another computer that is running the same operating system.

166

Total Protection Service Product Guide

Troubleshooting

Error messages

8

The browser cache is full. Empty the Internet Explorer cache: versions 5.5 and 6.x 1 Open the Internet Properties dialog box. Either: Right-click the Internet Explorer icon on the desktop and select Properties. From Windows Control Panel, open Internet Options. 2 Under Temporary Internet Files, click the Delete Files button. 3 Select Delete all offline content, then click OK. An hourglass appears while the files are being deleted. 4 Under Temporary Internet Files, click Settings, then click View Files. 5 Select Edit | Select All. 6 Select File | Delete. It might take a while for all the files to be deleted. When the deletions are complete. you are returned to the Internet Properties dialog box. 7 Click OK. version 7.0 1 Open the Internet Properties dialog box. Either: Right-click the Internet Explorer icon on the desktop and select Properties. From Windows Control Panel, open Internet Options. 2 Under Browsing history, click Delete. 3 Under Temporary Internet Files, click the Delete files button. Installation Declined. This message can appear after a failed installation or uninstallation of Total Protection Service. It indicates that leftover product files need to be removed from the client computer. Remove these components by downloading and running the MVSUninstall cleanup utility on the computer where you need to install (see Download utilities on page 93). Installation Denied. Common causes and solutions: When you begin the installation, Internet Explorer displays a dialog box asking you to verify that you want to install Total Protection Service. You must click Yes. Users must have administrator rights to install protection services on client computers. If they do not, you need to install the standalone installation agent (see Install the standalone installation agent on page 36). Check to be sure the system drive has enough free space. When installing all the protection services, a maximum of 50 MB might be required. The Windows system file REGEDIT.EXE must be present in the Windows directory. If it is missing, replace it using the original Windows install media or copy it from another computer that is running the same operating system.

167

Total Protection Service Product Guide

Troubleshooting

Error messages

8

Invalid Entitlement Error. The installation URL in your email message might have been truncated or badly formatted. Make sure that you are using the entire URL with no spaces, and that the company key at the end of the URL is complete. (The company key is the value after the characters CK=.) You might need to paste the URL into your web browser if you cannot click it from your email message. This error can also indicate that the trial evaluation period or subscription has expired, or that you are attempting to install protection services on more computers than you have purchased licenses for. MyASUtil.SecureObjectFactory error message. The SecureObjectFactory Class program might have become corrupted. To verify this, check the status of the SecureObjectFactory Class program file: 1 Launch Internet Explorer. 2 From the Tools menu, select Internet Options. 3 In the Temporary Internet Files section of the dialog box, click Settings to display the Settings dialog box. 4 Click View Objects to open the Downloaded Program Files folder. 5 Find the entry for SecureObjectFactory Class. Make note of the information in the Status and Creation Date columns: If the status and dates are listed as Unknown, delete the SecureObjectFactory Class program file. Uninstall and reinstall Total Protection Service to reload the file. If the status is listed as Installed, with valid dates, the file is not damaged. If there is another comment in the Status column, contact product support with that information.

If you do not see a Status column, set your view options to Details.

Note

MyINX Error. The installer has detected other virus protection software on the computer, which you must uninstall: 1 From the Windows Control Panel, open Add/Remove Programs. 2 In the list of programs, locate any virus protection software (including Total Protection Service), then click Remove. 3 Begin the installation process again. If you have uninstalled Total Protection Service and still receive this error, some components might be installed but not visible, because the installation was only partially completed. Remove these components by downloading and running the MVSUninstall cleanup utility on the computer where you need to install (see Download utilities on page 93).

168

Total Protection Service Product Guide

Troubleshooting

Error messages

8

On-access scan is currently disabled. This error can be caused by several problems, but the most common solutions are: Check your connection to the network server or Internet. This feature has been disabled. See Disabling on-access scanning on page 118 for instructions on enabling it. Unable to connect to Total Protection Service update server. Failed to connect to server for updates. This error can be caused by several problems, but the most common solutions are: Check your connection to the network server or Internet. Empty the Internet Explorer cache and adjust the security level settings to Medium or Medium-high. (see Configure your browser on page 35). Empty the Internet Explorer cache (see The browser cache is full. Empty the Internet Explorer cache: on page 167). Adjust your corporate firewall or proxy settings (see If you use a corporate firewall or proxy server on page 47). Unable to create Cab Installer Object. One possible cause is that the service MYAGTSVC.EXE is no longer running on the computer. You must manually restart it: 1 Select Start | Run. 2 Type the path to MYAGTSVC.EXE (you can use Browse to locate the file) and add the option /start. For example:

C:\winnt\mycio\agent\myagtsvc.exe /start

3 Click OK. If that does not solve the problem, contact product support.

This is a Microsoft Internet Explorer error, and might require installing a Microsoft patch.

Note

Update failed. Check your connection to the network server or Internet. Your software is not up-to-date. Please activate to receive the latest update. You have not activated your copy of Total Protection Service. You cannot receive updates against the latest threats until you activate. To activate, click the Total Protection Service icon in the system tray, then select Activate, or select the Activate link in a notification dialog box.

169

Total Protection Service Product Guide

Troubleshooting

Contacting product support

8

Your subscription has expired. Your trial has expired. Renew your subscription to re-activate your software. Purchase a subscription to re-activate your software. If you are using a pre-installed copy of Total Protection Service, your activated trial or your pre-installed subscription has expired. Click the Total Protection Service icon in the system tray and then select Buy or Renew your subscription, or select one of these links in a notification dialog box.

Contacting product support

There are three ways to contact product support. By email To contact product support via email, refer to your welcome email for your service provider's support address. By phone To access a list of current phone numbers for product support, visit: http://www.mcafee.com/us/about/contact/index.html From the web 1 Log on to the SecurityCenter with your user name and password. 2 Click the Help tab, then select Contact Support to display a form where you can submit a description of your problem to a product support representative. Browser protection support Before using the feedback feature to submit a question to product support, check the online list of frequently asked questions for the browser protection service. This list contains answers to the most common questions from users, organized by topic. To view frequently asked questions: From the SiteAdvisor menu, select Help. Additional sources of support are available for the browser protection service. To request support for SiteAdvisor: 1 From the SiteAdvisor menu, select Send feedback. 2 Select General McAfee Product Support. 3 Click a link for Customer Service, Technical Support, Virus Removal Services, or a McAfee partner company. A corresponding page appears with frequently asked questions and additional links for assistance.

170

Glossary

action item

Indicator of a potential vulnerability in your organization's security that requires attention. Action items appear in red on the SecurityCenter website in three locations: SecurityCenter page, Computer Details page, and in reports (as dates). How McAfee protection services handle or respond to detections; for example, Cleaned indicates that the detected threat was successfully removed. See reports. A user account with read, write, and delete permissions that manages an organization's Total Protection account. The administrator installs the software, receives status emails, and can access the SecurityCenter website. Compare to group administrator and user.

action taken

administrative reports administrator

agent allowed Internet application

See client software. An application, detected by the firewall protection service, that is specified as safe for contacting the Internet. Administrators make this selection in a policy; users respond to a prompt. A program, detected by the virus and spyware protection service, that is specified as safe and should not be detected. Administrators make this selection in a policy; users respond to a prompt. McAfee Avert Labs; a research center that supports the computing public and McAfee customers by researching the latest threats, and by uncovering threats that may arise in the future. Action taken by the firewall protection service to intercept and prevent a communication attempt. A service that provides safety ratings for websites and reports detailing known website threats. Compare to email security service, firewall protection service, and virus and spyware protection service.

approved program

Avert Labs

blocking

browser protection service

catalog file

A file on the Internet update site that contains version information for every component in Total Protection. Client computers check the latest catalog file to determine if their software components are up-to-date. The catalog file is stored in a compressed, digitally signed .CAB file format.

171

Total Protection Service 4.8 Product Guide

Glossary

Clean Failed

The virus and spyware protection service could not clean or delete the item. This might indicate that the item is in use; if so, close it and attempt the clean again. This might also indicate that the item resides on read-only media, such as a CD. If so, no further action is required. The virus and spyware protection service has prevented the original file from being accessed by the client computer, but it cannot delete the item. Any files copied to the computer have been cleaned. If the item is not in use or on read-only media, further action might be required to ensure the computer is not at risk. (1) Action taken by the virus and spyware protection service when it detects a threat such as a virus, Trojan horse, or worm. The cleaning action can include removing the threat from a file and restoring the file to usability; removing references to the threat from system files, system .INI files, and the registry; ending the process generated by the threat; deleting a macro or a Microsoft Visual Basic script that is infecting a file; deleting a file if it is a Trojan horse or a worm; renaming a file that cannot be cleaned. (2) A label applied to email that has been inspected by the email security service and found free of inappropriate content such as spam, phishing attempts, viruses, or particular content identified by your organization as undesirable.

clean, cleaning

client computer client software

A computer on which the Total Protection client software is installed. The Total Protection software module installed on each client computer. It serves as an intelligent link between the client computer and the SecurityCenter website by performing tasks (such as scanning and updating) on the client computer and sending report data to the SecurityCenter. Compare to SecurityCenter website.

configuration settings connection type

See policy. The type of network environment to which a client computer is connected; used by the firewall protection service to determine whether to trust communications from other computers on the same network. See also custom connection type, trusted connection, and untrusted connection.

cookie

A data file containing personal information that is created by a web server and stored on your computer. Cookies allow web servers to recognize you and track your preferences when you visit Internet sites. A network environment where only specified communications are allowed. The firewall protection service allows communications only from IP addresses and ports defined by the administrator. Compare to trusted connection and untrusted connection.

custom connection type

Customer Home site deployment

See SecurityCenter website.

Distributing and installing the Total Protection client software to computers from a central location, such as the administrative computer, via the silent installation or push installation method. Compare to URL installation.

detection definition files

DAT files (also referred to as signatures) that identify the code which anti-virus and anti-spyware software detect to repair viruses, Trojan horses and potentially unwanted programs (PUPs). Attempts to retrieve lists of valid email addresses from email servers. The email security service analyzes every IP address that connects to an email server and blocks messages that exhibit the characteristics of a directory harvest attack.

directory harvest attacks (DHA)

172

Total Protection Service 4.8 Product Guide

Glossary

download site EICAR test file

The McAfee website for retrieving product, DAT file, and engine updates. European Institute of Computer Anti-Virus Research has developed a file consisting of a string of characters that can be used to test the proper installation and operation of anti-virus and anti-spyware software. A web-based service that safeguards small business computers by automatically routing email messages through McAfee's servers and scanning for dangerous and inappropriate content before delivering the messages to the local network. Compare to browser protection service, firewall protection service, and virus and spyware protection service.

email security service

event firewall protection service

See inbound event. A web-based service that safeguards small business computers by automatically monitoring communications from other computers and Internet applications to check for suspicious activity, then generating reports. Compare to browser protection service, email security service, and virus and spyware protection service.

group

One or more client computers defined by a system administrator for managing security settings and analyzing report data. Groups can be determined by geographic location, department, computer type, or anything meaningful to your organization. A user account with permissions to monitor one or more assigned groups of computers. The account administrator sets up a group administrator account, assigns a password for accessing the SecurityCenter website, and specifies an access level that determines which tasks the group administrator is authorized to perform. Access levels are Read Only and Read & Modify Reports. Compare to administrator and user.

group administrator

inbound event

An attempt by another computer to send data to a client computer. The firewall protection service running on the client computer intercepts this attempt and responds according to policy settings. Installing the Total Protection client software on computers. See also push installation, silent installation, and URL installation.

installation

installation URL

A company-specific URL for installing Total Protection software on client computers. See also URL installation.

Internet application Internet Independent Updating (IIU)

An application that communicates with both the Internet and a client computer. A method that allows computers not connected to the Internet to use Total Protection. At least one computer on the subnet needs to have an Internet connection to be able to communicate with the McAfee update site. This computer is configured as a relay server, and other computers communicate with the update site through it. See also relay server, rumor technology, and update site.

license

An agreement to install McAfee software on a single client computer. When you purchase a subscription for McAfee protection services, you designate a specific number of licenses for the computers where the software using those services will be installed. You can also add and renew licenses for your subscription. Compare to subscription.

173

Total Protection Service 4.8 Product Guide

Glossary

mail exchange record

MX record; a software entry in your email domain name database that controls where email is routed. See mail exchange record. Information designating which automatically generated account emails, such as status emails and notices of account expiration, should be sent by the service provider. Administrators can configure notification preferences on the My Account page of the SecurityCenter website. A special detection definition file marked as Medium or High importance and released by McAfee Avert Labs in response to an outbreak. It is specially encoded to inform the first computer receiving it to share the update immediately with other client computers on the network. Administrators can configure a policy setting to check for outbreak DAT files more frequently than regular updates. See also detection definition files.

MX record notification preferences

outbreak DAT file

policy

A group of security settings that define how each McAfee protection service operates on client computers. Policies determine which programs and communications are detected as threats, the response to detections, the frequency of tasks such as scans and updates, and the implementation of many other features. A policy can be assigned to one or more client computers. A website where administrators can customize and view reports for the email security service. The portal's home page is accessed through links on the SecurityCenter website. Information for contacting a designated recipient (usually the account administrator) with information about a Total Protection subscription. Administrators can configure profile data on the My Account tab of the SecurityCenter website. An operating mode in which the client software prompts the user for a response to each detection; can be configured for spyware protection and for the firewall protection service in a policy. Compare to protect mode and report mode.

portal, email security service

profile

prompt mode

protect mode

An operating mode in which the client software blocks or attempts to clean detections automatically. Administrators can configure Prompt mode for spyware protection and for the firewall protection service in a policy. If the firewall protection service detects an unrecognized program, it blocks it. If the virus and spyware protection service detects a potentially unwanted program, it attempts to clean it. Compare to prompt mode and report mode.

push installation

Remotely deploying the Total Protection software directly from the service provider's website to one or more client computers, eliminating the need for any user interaction. Compare to silent installation and URL installation.

quarantine

Enforced isolation of a file or folder -- for example, to prevent a threat or to isolate a spam email message -- until action can be taken to clean or remove the item. The location on a computer system for storing email messages that might contain virus or other suspicious code; messages are stored until they can be reviewed and a course of action determined.

quarantine folder

174

Total Protection Service 4.8 Product Guide

Glossary

registry keys

Information stored in the Microsoft Windows system registry, which is a database containing the information required to configure a client system. Registry keys identify installed hardware, installed applications and their configuration settings, registered ports, and much more. Unwanted programs can change the value of registry keys or create new ones to execute malicious code. A network computer with an Internet connection that downloads updated files from the McAfee update site for retrieval by other network computers without Internet connections. See also Internet Independent Updating (IIU), rumor technology, and update site.

relay server

report mode

An operating mode in which the client software logs detections for reporting purposes but does not take additional action; can be configured for spyware protection and for the firewall protection service in a policy. Compare to prompt mode and protect mode.

reports

Data uploaded by client computers to the SecurityCenter and formatted for the administrator; information on the account's security status for the administrator. How McAfee protection services handle or take action on detections; for example, Cleaned indicates that the detected threat was successfully removed from the item where it was found. A method that allows all computers on a subnet to share downloaded files, saving each computer from having to download from the update site on the Internet every time it needs an updated file. See also Internet Independent Updating (IIU), relay server, and update site.

response

rumor technology

scan

An examination of files to determine if a threat is present. See on-access scanning and on-demand scanning.

scanning engine script scanning

The mechanism that drives the scanning process. A protection method that detects harmful scripts contained in files, emails, and web pages. Scripts are programs or sequences of instructions that are run by other programs instead of by a computer's processor. A website containing the administrative features of Total Protection, where administrators can centrally manage protection services on client computers. Formerly known as the Customer Home site. Compare to client software.

SecurityCenter website

silent installation

Remotely deploying Total Protection software onto a client computer, eliminating the need for any user interaction. Compare to push installation and URL installation.

spooling

Storing data at an alternate location so that it can be processed later. When your local email server is not accepting email, the email security service spools your organization's email to McAfee's server, then delivers the email when your local email server is functioning properly again. SPOOL stands for Simultaneous Peripheral Operations On Line. An agreement to receive access to electronic protection services for a specified period of time. While your subscription is active, you receive regular updates Compare to license.

subscription

175

Total Protection Service 4.8 Product Guide

Glossary

system services

Functionality provided by software running on the network that performs essential tasks, such as transmitting or converting data in a network, delivering and receiving email, or interacting with applications on the Internet. An activity (both one-time such as on-demand scanning, and routine such as updating) that is scheduled to occur at a specific time, or at specified intervals. Compare to policy.

task

Total Protection icon

The icon that appears in the system tray of client computers running the Total Protection Service software. Click the icon to display a menu of commands, or double-click the icon to manually update the computer. A connection to a home or office network that is protected from the Internet by hardware such as a router or firewall. The firewall protection service allows communications from other devices on a trusted network (it considers them to be safe). Compare to untrusted connection.

trusted connection

untrusted connection

A direct connection to the Internet, such as a wireless network in a public airport or hotel. The firewall protection service blocks communications from other devices on an untrusted network (it considers them to be unsafe). Compare to trusted connection.

update site updates

A repository on the Internet from which a client computer retrieves updates. Files from McAfee that provide more current information to a product. Updates can include upgraded software components and definition detection (DAT) files containing revised information about existing threats and new information about recently identified threats. See also detection definition files.

updating

The process of installing updates to existing products or upgrading to new versions of products. Installing the Total Protection client software locally on a client computer by clicking a link to a unique website, sent via email from an administrator. The URL determines the protection services installed, the language for Total Protection Service services, and the group where the computer is placed. Compare to push installation and silent installation.

URL installation

user

The person who uses the Total Protection software on a client computer. Compare to administrator and group administrator.

utilization

The way in which your licenses for McAfee protection services are being used. Total Protection issues utilization action items and notifications when you attempt to install client software on more computers than you have purchased licenses for, or when the number of computers you have installed client software on approaches the number of licenses you have purchased. A web-based service that safeguards small business computers by automatically checking files and email messages for viruses and spyware, then generating reports. Compare to browser protection service, email security service and firewall protection service.

virus and spyware protection service

176

Index

A

About menu command 57 access levels for group administrators 79 access protection rules 156 accessing email security service portal 144 account adding new subscriptions and licenses 91 configuring profile for 66 email security service see email security service security coverage 69 updating email address 88 updating subscription information 90 account enrollment key defined 51 viewing or creating 51 accounts creating a new account 50 joining an existing account 50 merging 92 action items 69 Activate menu command 57 activating Activate menu command 57 email security service 144 license key 51 Total Protection Service, advantages of 157 Total Protection Service, instructions for 50 ActiveX controls online help and 164 push installation and 44 Add/Remove Programs removing existing virus protection 33, 168 removing other firewall programs 35 adding allowed Internet applications 73,

74, 130, 132

group administrators 80 groups 77 IP addresses 128 licenses 91 logo for reports 89 policies 83 service ports 127 subscriptions 91 Administration page, illustrated 149 administrative client menu 58 administrative computers defined 44 requirements for push installation 45 administrator rights 36 administrators client software menu for 58 custom email address for 66 documentation for 24 group administrators 78 hands-off 22 updating email address for 88 Advanced Installation Methods page, illustrated 40 Advanced product defined 11 getting information for 25, 54 products included in 11 Advanced Settings policy tab, illustrated 105 allowed Internet applications adding to policies 74, 132 configuring 129, 130 viewing and managing 74 viewing unrecognized applications 132 anti-virus applications, removing 168 applications, allowed Internet see allowed Internet applications approved programs adding to policies 73, 74, 109 McAfee Default policy and 74 viewing and managing 73, 74, 109 Approved status, Potentially Unwanted Program Viewer 102

archives see compressed files assigning computers to a group 76 policies to groups 77 audience for Product Guide 22 authentication support 47 automatic updates activation and 50 defined 58 Avert Labs defined 12 Information Library 24 Avert Labs Threat Center 25 Avert Labs Threat Library 25

B

background tasks 161 balloons, safety 138 bandwidth conservation on LANs 16 behavior blocking rules 156 best practices firewall protection service 134 for large accounts 164 virus and spyware protection service 116 beta program website 25 blocking access protection rules 156 behavior blocking rules 156 computers 75 inbound communications 128 Internet Explorer 161, 162 service ports 128 unrecognized programs 108, 123 browser clearing cache 167 configuring 35 non-Microsoft 35 requirements for browser protection 137 requirements for installing Total Protection Service 29 security settings 35 troubleshooting 163

approved programs 73, 74, 109

177

Total Protection Service Product Guide

Index

Browser Protection policy tab 140 browser protection service browser types supported 137 browsing websites 139 configuring settings for 140 defined 11 enabling or disabling color coding for menu 141 enabling or disabling safety icons

141

how it works 14 icon 56 installing 37 menu 57 online help for 56 operation, illustrated 10 Scan Tasks menu 95 using 56 closing service ports 128 color-coded menu 139, 141 company key, installation and 42 compressed archives scanning during on-access scans

106

IP addresses 128 language 66 logo, adding and deleting 89 MX records 145 My Profile 66 on-demand scans 100 outbreak response 106 password 67 policies 81 policies, email security 151 scanning compressed archives

106

encrypting browser data 141 highlighting search results 141 installing via policy 140 product improvement program

141

script scanning 106 service ports 127 spyware protection mode 108 spyware protection options, advanced 110 spyware protection options, basic 107 spyware protection status 107 status emails 67 update frequency 105 virus protection options, advanced 105 virus protection options, basic

103

safety balloons 138 safety icons 138 safety reports 140 searching websites 138 SiteAdvisor menu 139, 141 submitting feedback 142 support for 170 testing websites 138 browser, non-Microsoft 162 browsing patterns, protecting 141 browsing websites protection for 139 safety icons 141 buffer overflow protection configuring 106 on-access scanner and 118 Buy menu command 57 buying subscriptions and licenses see purchasing

scanning during on-demand scans 106 compressed files delete failed in 102 scanning options for 106 Computer Details page, overview

72

Computer Profiles report 87 computer profiles, viewing 87 computers assigning to a group 76 blocking 75 deleting from reports 75 detections, viewing 74 displaying details 72 duplicates, viewing 86 managing, overview 70 obsolete, viewing 75 reports for managing 71 scanning 97 searching for 71 sending email to 75 tasks for managing 71 unblocking 75 viewing 70 viewing profiles for 87 Computers page, using 70­71 configuring account information 66 allowed Internet applications 73,

74, 129, 130, 132

virus protection, optional 106 connection type Custom 124, 125­129 overview 124 Trusted 124 Untrusted 124 contacting product support 93, 170 cookies in Detections report 112 in Unrecognized Programs report 113, 132 required for installation 39 scanned during on-demand scans 98 coverage, security 69 creating group administrators 80 groups 77 new account 50 policies 83 custom connection type 125­129 Custom Settings page 125­129 customer service, contacting 25 customizing administrator email address 66 listings and reports 65 reports 86

C

CAB file 16 cancelled subscriptions 90 cannot clean detection 102 catalog file 16 CD version of software, requirements for 49 CHAP proxy 59 Clean failed status, Quarantine Viewer 118 cleaning files from previous installations

168

approved programs 73, 74, 109 browser for installing Total Protection Service 35 browser protection 140 buffer overflow protection 106 custom connection type 125­129 email scanning 106 email security service settings

146­150

potentially unwanted programs

101

quarantined files 117 cleanup utility 168 client software administrative menu 58 displaying firewall settings 119 documentation for 24

D

DAT files 161

excluded files and folders 104

178

Total Protection Service Product Guide

Index

Avert Labs notification service for updates 25 defined 16 EXTRA.DAT 59 outbreak DAT 59 updates, frequency 105 updates, troubleshooting 161,

169

detections cannot clean 102 cleaning 101 cookies 99, 101 fast user switching and 33 handling 100 history, viewing 115 managing 116 potentially unwanted programs

101

account information 66 approved programs 109 contact information 66 custom connection type 125 group administrators 80 groups 77 IP address ranges 128 logo for reports 89 MX records 145 notification preferences 67 password 67 policies 83 profile 66 service ports 127 subscription information 90 EICAR test virus 52 email addresses adding new services 91 administrator, updating for 88 administrator's (customized) 66 client computers, updating for 88 entering during installation 39 for identifying workstations in reports 156 group administrators, updating for 80 renewing services and 91 email scanning, email security service 143 email scanning, virus and spyware protection service enabling 100 on-demand scan 53 email security service activating 144 Administration Guide 153 Administration page 149 configuring MX records 145 configuring settings for 146­150 default settings 146 defined 11 getting information 153 overview 143 policies 151 portal, illustrated 145 protection status, viewing 150 reports, viewing 151 setting up account 145­150 troubleshooting 153, 163 email server security application defined 11 getting information for 12, 25 installation requirements 31 emails language configuration 66

updates, website 25 default email security service settings

146

quarantined files, viewing 117 registry keys 99, 101 unrecognized programs, viewing

113

firewall, setting up 53 McAfee Default policy settings

82

Default Group, defined 77 default policy settings McAfee Default 84 restoring 84 definition of terms (See Glossary) delete failed status Potentially Unwanted Program Viewer 102 Quarantine Viewer 118 deleting allowed Internet applications 131 approved programs 109 computers from reports 75 duplicate computers 87 excluded files and folders 104 group administrators 80 groups 77 IP address ranges 129 logo for reports 89 obsolete computers 75 policies 84 demos, accessing 94 deploying client software push installation 44­47 silent installation 41­43 deploying standalone installation agent 36 deployment tools 36 for silent installation 41 for standalone installation agent

36

Detections report 112 Disable On-Access Scanner menu command 58, 96 disabling blocked events reporting 129 color coding, SiteAdvisor menu

141

on-access scans 118 safety icons 141 spyware protection 107 system service ports 128 updates for non-logged-on users

60

Windows firewall 161 Windows Vista firewall 53 Windows XP firewall 53 disk space requirements 167 displaying computer details 72 icon 57 documentation list of all product documentation

24

troubleshooting display of 164 viewing 92 downloading cleanup utility 93 MVSUninst 93 Push Install utility 46, 93 standalone installation agent 36 utilities 93 VSSETUP 42, 93 duplicate computers deleting from reports 87 viewing 86 Duplicate Computers report filtering data for 87 illustrated 86

Desktop Firewall policy tab, illustrated 121 details, viewing computer details 72 detection details 112 potentially unwanted program details 114 detection definition files see DAT files Detection History report 115

E

ECare link 170 editing 125

179

Total Protection Service Product Guide

Index

notifications, configuring 67 Quarantine Summary 152 status 67 to client computers 75, 88 to group administrators 80 to users 88 enabling advanced spyware protection

110

Your software is not up-to-date

169

user settings 122 viewing reports 131­134 Windows firewall and 53 Firewall Settings command 119 menu command 57 free disk space see requirements frequently asked questions (FAQ)

156­164

Your subscription has expired

170

Your trial has expired 170 evaluating McAfee products, download website 25 events blocking 128 tracking blocked events 129 viewing 133 excluded files and folders, configuring 104 Exit menu command 58 EXTRA.DAT files 59

advanced virus protection 106 blocked events reporting 129 buffer overflow protection 106 color coding, SiteAdvisor menu

141

G

getting information about Total Protection Service Advanced 25 demos and tutorials 94 email security service 153 for administrators 24 for users 24 product support 170 glossary 171 group administrators access levels 79 creating 80 deleting 80 editing 80 illustrated 78 overview 78 tasks for 79 groups assigning policies to 77 creating 77 Default 77 deleting 77 editing 77 group administrators for 78 illustrated 20 moving computers into 76 overview 76 renaming 77 Groups + Policies page illustrated 77 tasks performed from 77, 81 GroupShield defined 11 getting information for 12, 25 requirements 31

compressed archive scanning

106

F

fast user switching disabling updates for 60 support for 32 features, new 13 feedback, submitting to browser protection service 142 filtering data on SecurityCenter pages 65 firewall corporate network 47 default 53 troubleshooting 161 uninstalling existing software 35 Windows Vista 35, 53, 155, 161 Windows XP 35, 53, 155, 161 Firewall Custom Settings page, illustrated 127 firewall protection service allowed Internet applications 73,

74, 129, 132

email scanning (virus and spyware protection service) 106 firewall installation via policy 122 firewall protection 122 on-access scanning 118 outbreak response 106 safety icons 141 scheduled on-demand scans 104 script scanning 106 spyware protection 107 system service ports 127 encrypting browser data 141 error messages A file needed to install the software is not available 165 Activate your software 165 Cannot find remote shared directory 166 Failed to connect to server for updates 169 File does not exist 166 Installation cannot proceed 166 Installation Declined 167 Installation Denied 167 Invalid Entitlement 168 MyASUtil.SecureObjectFactory

168

best practices 134 custom connection type 125­129 defined 11 enabling 122 inbound events 133 installing on servers 122 installing via policy 122 interaction between user and administrator settings 122 IP address configuration 128 Learn mode 124 overview 119 policy settings 120­131 Prompt mode 122, 123 Protect mode 122, 123 protection mode 123 Report mode 122 uninstalling existing firewall software 35 unrecognized programs 132

MyINX 168 On-access scan is currently disabled 169 Purchase a subscription to re-activate your software 170 Renew your subscription to re-activate your software 170 Unable to connect to Total Protection Service update server 169 Unable to connect to update server 169 Unable to create Cab Installer Object 169 Update failed 169

H

help demos 94 features of 65 Help page 92 menu command 57 navigation procedures for 65 online, types of 24

180

Total Protection Service Product Guide

Index

troubleshooting 164 tutorial 94 using 65 viewing administrator help 92 highlighting search results 141 history detections 115 subscription 90 HotFix and Patch releases (for products and security vulnerabilities) 25

users without administrator rights 36 via policy 140 without a license key 51 installation agent see standalone installation agent installation methods 27 push installation 44­47 silent installation 41­43 URL installation 37­39 installation URL, obtaining 37 Internet applications see allowed Internet applications Internet Explorer blocking 162 cache, emptying 169 configuring security settings 35 FAQ 163 troubleshooting 162, 164 Internet Independent Updating (IIU) defined 17 relay servers 48 Internet traffic load, minimizing 16 Internet URL installation see URL installation intrusions, managing 134 IP addresses, configuring 128

manual updates 59 manuals for products 24 McAfee Default policy defined 82 revising 74 McAfee SecurityCenter see SecurityCenter website memory, scanning 98 menu administrative 58 client software 57 Firewall Settings command 119 Scan Tasks 95 menu, SiteAdvisor description of 139 displaying menu button 139 enabling or disabling color coding for 141 merging accounts defined 92 instructions for 92 Microsoft Exchange Server 2000 32 Microsoft Exchange Server 2003 31 Microsoft Exchange Server 2007 31 modes firewall protection 123 firewall protection, interaction between 122 Learn (firewall protection) 124 Learn (spyware protection) 109 spyware protection 108 moving computers into a group 76 MVSUninst utility 93, 168 MX records, configuring 145 My Profile 66

I

icon appearance 56 displaying 57 fast user switching support 33 removing 57 terminal server support 33 icons, safety 138, 141 identifying workstations in reports

39, 156

Inbound Events Blocked by Firewall report filtering data for 133 illustrated 133 policy option for 129 information about Total Protection Service Advanced 25 for administrators 24 for users 24 installation 29 administrator rights 36 before you begin 33 browser protection service via policy 140 completing 52 corporate network firewall and

47

J

join an existing account 50

K

KnowledgeBase search 25

L

language, configuring 66 Learn mode 109, 124 license key activating 51 installing without a license key

51

N

new features 13 non-logged-on users, disabling updates for 60 non-Microsoft browsers 35 notifications about account and service status

67

entering email address 39 firewall protection service via policy 122 free disk space required 167 methods 37 proxy server and 47 push 44­47 requirements for pre-installed or CD software 49 requirements see requirements silent 41­43 standalone installation agent 36 stops responding 156 testing 52 tutorial 94 URL, overview 37

location of 49 licenses 89­91 protecting computers while purchasing licenses 157 Local Area Network (LAN), saving bandwidth on 16 logging on to SecurityCenter site 62 logo adding 89 deleting 89 requirements 89 uploading 89

about operating system support

30

about subscriptions 91 language configuration 66 NTML proxy 59

O

obsolete computers, viewing and deleting 75 on-access scanning, troubleshooting 169 on-access scans defaults 97

M

Mail eXchange records see MX records

181

Total Protection Service Product Guide

Index

different results than on-demand scans 82, 106 disabling 118 overview 97 Potentially Unwanted Program Viewer and 101 scanning compressed archives

106

editing 83 email security, configuring 151 firewall protection 120­131 McAfee Default 74, 82 overview 21, 81 restoring default settings 84 revising default 74 users changing 81 virus and spyware protection

103­110

Potentially Unwanted Program Viewer 101 Approved status 102 clearing or retaining detections from previous scans 101 Delete failed status 102 quarantine status 102 using 101 potentially unwanted programs cleaning detections 101 excluding detections 101 viewing detections 101 pre-installed software requirements for 49 setting up 49 preventing popup prompts 108, 123, 158 user approval for programs 108,

123

on-demand scans client computers 53 defaults 98 detection resolution 100 different results than on-access scans 82, 106 email (virus and spyware protection service) 53 from Windows Explorer 98 overview 98 Potentially Unwanted Program Viewer and 101 procedure 98 scanning compressed archives

106

policies, browser protection installing via policy 140 policies, firewall protection Administrator configures firewall

121

allowed Internet applications 73,

74, 130, 132

blocked events reporting 129 connection type 124 custom connection type 125­129 enabling firewall protection 122 enabling firewall via policy 122 Firewall Configuration 121 protection mode 123 User configures firewall 121 policies, virus and spyware protection approved programs 73, 74, 109 buffer overflow protection 106 email scanning 106 excluded files and folders 104 optional virus protection 106 outbreak response 106 scanning compressed archives

106

product Advanced 25 defined 11 demos and tutorials 94 information for users and administrators 24 manuals 24 support, contacting 93, 170 upgrades 25 versions 11 product improvement program 141 professional services, McAfee resources 25 profile, configuring 66 programs see also allowed Internet applications see also approved programs viewing unrecognized 113 Prompt mode firewall protection service 122,

123

scheduling 100, 104 viewing results 99 on-demand updates 59 online help see help open windows 161 opening service ports 127 operating systems reinstalling 158 requirements for push installation 45 requirements for URL installation 37 requirements for, general 29 support ending for 29 outbreak DAT files origin of 12 updating 59 outbreak response 106 overview of product 9

scheduled on-demand scans 104 script scanning 106 spyware protection mode 108 spyware protection options, advanced 110 spyware protection options, basic 107 spyware protection status 107 update frequency 105 virus protection options, advanced 105 virus protection options, basic

103

user/administrator settings and

108, 122, 123, 125

P

password configuring 67 emailing to group administrators

80

virus and spyware protection service 108 Protect mode firewall protection service 122,

123

policies assigning to groups 77 browser protection 140 configuring 81 creating 83 default settings 82 defined 21 deleting 84

policy installation 122, 140 popup prompts, preventing 108, 123,

158

virus and spyware protection service 108 protection, browser for browsing patterns 141 while browsing 139 while searching 138 proxy server, installing or updating with 47 proxy, CHAP or NTML 59

portal, email security service 145 accessing 144 Administration page 149 ports see service ports

182

Total Protection Service Product Guide

Index

purchasing additional licenses 157 subscription, from trial 51, 57 subscription, general recommendations 91 push installation ActiveX controls 44 diagram 44 downloading from Utilities page

93

registry keys detections, handling 99 scanned during on-demand scans 98 reinstalling operating systems 158 relay servers enabling 48 push installation 48 silent installation 48 release notes 24 removing allowed Internet applications 131 approved programs 109 computers from reports 75 duplicate computers 87 excluded files and folders 104 existing firewall software 35 existing virus protection software 33, 168 group administrators 80 groups 77 icon 57 IP address ranges 129 logo for reports 89 policies 84 system service ports 128 renaming groups 77 Renew menu command 57 renewing subscriptions and licenses 51, 57, 91 Report mode firewall protection service 122,

123

samples 160 saving old data in 160 Scan Statistics 99 sorting data in 65 Unrecognized Programs 113, 132 uploading a logo 89 uploading client data to the SecurityCenter 16 viewing 85 virus and spyware 111­115 website safety (browser protection) 140 requirements browser, for browser protection service 137 browser, for installing Total Protection Service 29, 35 CD versions 49 email security service 31 email server security application

31

enabling relay servers 48 overview 37 procedure 46 requirements 45 restarting client computers after

47

troubleshooting 166

Q

Quarantine status, Potentially Unwanted Program Viewer 102 Quarantine Summary email 152 Quarantine Viewer clean failed status 118 delete failed status 118 menu command 58, 96 overview 117 quarantined email deliveries 153 monitoring 153 overview 152 Quarantine Summary 152 viewing 152 quarantined files, virus and spyware protection clean failed 118 delete failed 118 Quarantine Viewer command 58,

96

free disk space 167 general 29 GroupShield 31 Internet URL installation 37 logo 89 operating system 29 pre-installed copies 49 push installation 45 RAM 31 silent installation 41 system 29 URL installation 37 Rescan, Quarantine Viewer option

117

virus and spyware protection service 108 reporting questions 160 reports Computer Profiles 87 customizing 86 customizing data in 65 deleting computers from 75 Detection History 115 Detections 111 Duplicate Computers 86 email security service 151 filtering data in 65 firewall protection service

131­134

restarting client computers after push installation 47 Restore, Quarantine Viewer option

117

rescanning 117 restoring 117 viewing 117 Quick Start Guide 22

restoring default policy settings 84 quarantined files 117 results, on-demand scans 99 revising default policy 74 rogue systems 75 rumor technology 16

R

RAM requirements 31 Read & Modify Reports tasks 79 Read Only tasks 79 receiving promptly after an outbreak 161 recommended practices firewall protection 134 for large accounts 94 virus and spyware protection 116 REGEDIT.EXE, system file 166, 167 registering email security service

144

S

safety balloons 138 icons 138, 141 icons, enabling or disabling 141 reports 140 sample reports 160 Scan menu commands 96 Scan Now feature 98

for managing computers 71 identifying workstations in 39 Inbound Events Blocked by Firewall 133 list of 85 overview of 85 page, illustrated 85 Quarantine Summary 152

183

Total Protection Service Product Guide

Index

Scan Statistics report 99 Scan Tasks menu command 57 scanning automatic see on-access scans client computers 53, 97 compressed archives 106 cookies 98 detection resolution 100 email, by email security service

143

Help page 92 logging on and off 62 My Account page 66, 78, 88, 89 notification preferences 67 operation, illustrated 10 overview 18, 60 page controls, illustrated 64 password configuration 67 Reports page 85 searching 71 security coverage 69 SecurityCenter page 67 sorting listings 65 tabs, illustrated 63 tasks performed from 62 tasks, illustrated by tab 63 viewing detections 74 viewing reports 85 sending email to client computers 75 to group administrators 80 to users 88 server installing firewall protection service on 122 requirements for email server security application 31, 32 unable to connect to update server 169 service ports 125 adding or editing 127 closing 128 opening 127 overview 126 standard 126 ServicePortal, technical support 25 settings, configuring for browser protection 140 silent installation company key 42 diagram 41 enabling relay servers 48 overview 37, 41 procedure 42 requirements 41 SiteAdvisor menu description of 139 displaying menu button 139 enabling or disabling color coding for 141 SiteAdvisor toolbar, displaying 139 sorting data on SecurityCenter pages 65 spyware protection approved programs 73, 74, 109

detections 101 enabling and disabling 107 mode 108 status 107 Spyware Protection policy tab, illustrated 107 SSL communications 141 standalone installation agent defined 36 deploying 36 downloading from Utilities page

93

email, by virus and spyware protection service 100, 106 memory 98 on-access 97 see on-access scans on-demand 98 questions 159 registry keys 98 scripts 106 spyware 101 scheduling on-demand scans 100,

104

status email protection 150 spyware protection 107 status emails configuring 67 language configuration 66 submit a sample, Avert Labs WebImmune 25 subscriptions 89­91 support for browser protection service 170 operating systems, ending 29 support, contacting 93, 170 system services see service ports

script scanning 106 searching for computers 71 searching websites highlighting search results 141 protection for 138 safety icons 141 security coverage 69 Security Headquarters (See Avert Labs) security settings defining in policies 81 firewall protection 120­131 Internet Explorer 35 users changing 81 virus and spyware protection

103­110

T

tabs all, illustrated 63 Computers, illustrated 70 Groups + Policies, illustrated 77 Help 92 My Account 66, 78, 88, 89 Reports, illustrated 85 tabs, policy Advanced Settings, illustrated

105

security strategy, recommended firewall protection 134 virus and spyware protection 116 security updates, DAT files and engine 25 security vulnerabilities, releases for

25

Browser Protection 140 Desktop Firewall, illustrated 121 Spyware Protection, illustrated

107

Virus Protection, illustrated 103 target computers defined 44 restarting after push installation

47

SecurityCenter page illustrated 68 overview 67 tasks performed from 68 SecurityCenter site action items 69 Computers page 70 downloading utilities 93 filtering listings 65 getting started 62 Groups + Policies page 76

tasks listed by tab 63 listed by type 62 running in background 161 technical support, contacting 25, 93,

170

Temp directory, troubleshooting 156 terminal servers

184

Total Protection Service Product Guide

Index

disabling updates for 60 support for 32 testing virus and spyware protection 52 websites, for safety 138 Threat Center (See Avert Labs) threat library 25 toolbar, SiteAdvisor, displaying 139 Total Protection Service ­ Advanced getting information for 12, 54 products included in 11 Total Protection Service icon see icon training, McAfee resources 25 trial activating 50 creating when license key unavailable 51 requesting 91 requirements for 49 troubleshooting 155 adding, renewing licenses 157 cloned systems 160 computers missing from reports

160

Unrecognized Programs report adding allowed Internet applications to policies 133 adding approved programs to policies 114 filtering data for 113, 132 illustrated 113, 132 untrusted connection type 124 Update Now menu command 57 update server, unable to connect to

169

documentation for 24 using this guide audience 22 typeface conventions and symbols 23 utilities cleanup utility 93, 167, 168 downloading 93 MVSUninst 93, 168 Push Install utility, defined 44 standalone installation agent, defined 36 VSSETUP, defined 41 Utilities page 93

updates activation and 50 CHAP or NTML proxy and 59 failed 169 first network detection and 50 unable to connect to update server 169 updating automatically 58 client email addresses 88 configuring frequency 105 content of updates 15 email address for administrator

88

V

versions, product 11 View PUP Detections command 96 viewing allowed Internet applications 74 blocked events 129, 133 cancelled subscriptions 90 computer profiles 87 cookie detections 99 detection history 115 detections 111 detections for a computer 74 duplicate computers 86 email protection status 150 inbound events 133 potentially unwanted program detections 101 quarantine files 117 quarantined email 152 quarantined email deliveries 153 registry key detections 99 results of on-demand scans 99 safety icons 141 safety reports (browser protection) 140 SiteAdvisor toolbar 139 subscription history 90 subscriptions 90 unrecognized programs 113, 132 user-approved programs 74 virus and spyware protection service approved programs 73, 74, 109 best practices 116 defined 11 handling detections 100 Learn mode 109 on-access scans 97 policy settings 103­110 Prompt mode 108 Protect mode 108

errors 169 Internet Independent Updating (IIU) 17 manually 59 methods, illustrated 15 non-logged-on users 60 on demand see on-demand updating overview 14­16, 58­60 subscription information 90 Update Now command 57 upgrade website 25 uploading logo 89 report data 16 URL installation customized URL 38 obtaining the URL 37 procedure 38 requirements 37 sending URL to users 38 troubleshooting 156 User Account Control dialog box 39 user-approved programs adding to policies 73, 74, 109, 132 McAfee Default policy and 74 preventing 108, 123 viewing and managing 73, 74 users changing security settings 81,

122

email security service 163 free disk space 167 general 163 installation 156 installing without administrator rights 156 moving licenses 157 online help 164 popup prompts 158 push installation 166 REGEDIT.EXE, missing system file 166, 167 reporting 160 scanning 159, 160 uninstalling existing virus protection software 168 uninstalling previous installations 93 windows are open but not visible

161

trusted connection type 124 tutorials, accessing 94

U

unblocking computers 75 uninstalling components from previous installations 93 existing firewall software 35 existing virus protection software 33, 168 troubleshooting 168

185

Total Protection Service Product Guide

Index

Report mode 108 testing virus protection 52 uninstalling existing virus protection software 33 viewing reports 111­115 Virus Information Library (See Avert Labs Threat Library) Virus Protection policy tab, illustrated 103 VSSETUP utility command parameters 43 defined 41 downloading from Utilities page

93

enabling relay servers 48

W

WebImmune, Avert Labs Threat Center 25 websites protection while browsing 139 protection while searching 138 testing for safety 138 Windows 2000 push installation administrative computer 45 Windows Explorer, on-demand scans from 98 Windows firewall firewall protection service and

53, 161

log 161 Windows NT push installation administrative computer 45 Windows Vista firewall 35, 53, 155, 161 User Account Control dialog box

39

Windows XP fails to recognize virus protection

163

fast user switching support 32 firewall 35, 53, 155, 161 push installation administrative computer 45 updating computers where no user is logged on 60 Windows XP Home Edition 45 windows, open 161

186

Information

ProductGuide.book

186 pages

Report File (DMCA)

Our content is added by our users. We aim to remove reported files within 1 working day. Please use this link to notify us:

Report this file as copyright or inappropriate

283697

You might also be interested in

BETA
External Website Update June 2012.xlsx
Trends in communications and media technology, applications and use
RTE_GL_A8040_DS_SatL300.qxd
HP EliteBook 8530w Mobile Workstation